Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 01:47

General

  • Target

    34701fc56e78ffc14b208bdb76c43270N.exe

  • Size

    1.1MB

  • MD5

    34701fc56e78ffc14b208bdb76c43270

  • SHA1

    d172dd4abf11916bdae2325edbcef52f27809e76

  • SHA256

    711a632cd1d234631adde9169426bea385b85d34844e13d59297718e6ffd73b8

  • SHA512

    ed58574c7258a86838436b5bcf08be4f02f74849cdffc824f053e6e034662fc5440306320d884723384b1b960e8312d3b90d186dd77d8d7de7920499ad6cf319

  • SSDEEP

    24576:Jh+EpSGP3ZEgRhuRKOODz6HY1SC9s6WcREFydry9u6HxyAg/:5a+P6HpcTdneY/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\34701fc56e78ffc14b208bdb76c43270N.exe
    "C:\Users\Admin\AppData\Local\Temp\34701fc56e78ffc14b208bdb76c43270N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2088-0-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/2088-1-0x0000000000400000-0x0000000000526000-memory.dmp

    Filesize

    1.1MB