Analysis

  • max time kernel
    40s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 05:21

General

  • Target

    Files/07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150.exe

  • Size

    1.1MB

  • MD5

    d444a977328b0f1b5e792a794ccd9fd0

  • SHA1

    32a67b71ebb303ee25928a1eb76c548d384589b8

  • SHA256

    07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150

  • SHA512

    d71d6e38ab5a6b0bfead3f288f4202550a46991b02fda710c026248de66fe8b4d5ae7767018671413deee3d3a92a3a5934be1a95ff1e3909fecdb9b7cb0ec9e7

  • SSDEEP

    24576:ru6J33O0c+JY5UZ+XC0kGso6FajYuNaeNAymutbrfYJfIcWY:Fu0c++OCvkGs9FajYulNZvJUfiY

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Files\07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150.exe
    "C:\Users\Admin\AppData\Local\Temp\Files\07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\07610c4fda6b5d6e8920d8da44a58213ef6c4309c794978477e81ed50f885150.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vaccinators

    Filesize

    282KB

    MD5

    d4281853a0d97ad5259ca9721bbe84e7

    SHA1

    4ff00025186f96e05341188ace6be7b10efcb48c

    SHA256

    71b0bf07a7d04e707ce9910f808ad3d77f56c6eb1c1c21ff3f62b45c3b7f553f

    SHA512

    45a564fad1caa52bdb34c087385f1cdb74434c31a293733aafae4e87d687c59739a3ab699b89d262707b006c9b5843feb3febfc65211bb51e375fb79715b1042

  • memory/988-7-0x0000000000CC0000-0x00000000010C0000-memory.dmp

    Filesize

    4.0MB

  • memory/2808-8-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2808-9-0x0000000000720000-0x0000000000A23000-memory.dmp

    Filesize

    3.0MB

  • memory/2808-10-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2808-11-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB