Resubmissions

24/03/2025, 00:06

250324-adxjzszzez 10

23/03/2025, 20:32

250323-zbkj3svsc1 10

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2025, 20:32

General

  • Target

    1.exe

  • Size

    544KB

  • MD5

    b8181cb72764c24e73c7b6204b16bed6

  • SHA1

    c430cc4776ff5e21d08bca9a0d73cfaf29108fa4

  • SHA256

    fdb5a0d4e97ee36d2b23605b0d8a2785d08d046058f07a8714e4908e8a2485a2

  • SHA512

    bd63970b846bfdc6990b803e12028c692bc3f3125df03c3b9ec4626e1ce56dc43313d37c71337868ade0e4da31a5eca971b453242829b7312eb7efd2a407de1d

  • SSDEEP

    12288:WPWVd0taaWew/8s63jxtNAcbYl7rvO6FFo/JVWOPx3/y:cGWcQwcTxth0lHvHoxVWOP

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads