Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 20:31

General

  • Target

    02315851b7f0a6e1527ae662d5a59090N.exe

  • Size

    139KB

  • MD5

    02315851b7f0a6e1527ae662d5a59090

  • SHA1

    55df3c8a908f4d4c4dc500029b8ab28b156ed694

  • SHA256

    908669ce3e36cf6e9efa677398453a189f8fabbaa7b89ecdb30af266191fa448

  • SHA512

    44e55fb3ab11ca061b6e5d8d468ca8029fc6cbe05569d827ab2488e786efff770d3fde712d062df141827e7ae5df53c93988d7e7e3bc8e788707da0c9eaf4c6b

  • SSDEEP

    3072:hs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/+/Fnncr5:hDeM7iNEkgiOb31k1ECgJq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\02315851b7f0a6e1527ae662d5a59090N.exe
    "C:\Users\Admin\AppData\Local\Temp\02315851b7f0a6e1527ae662d5a59090N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-q8JB85WWnzCc4XIa.exe

    Filesize

    139KB

    MD5

    b7555a3759561280b42633dd80d9f705

    SHA1

    f29e36a3272b2fbe58e1ae4cbe401b1c0b94f1bd

    SHA256

    d8050b529ad21bcca8d4ecf0acd9cfa7c69e02b42ef9c14b9e5276859888281e

    SHA512

    faa2fd6e4212fd006e60321f2b7645a94a10083ec7c6b6c604127d45fc7a106d76bbfd4d5a43f7fe42d21c1f89e54681e6af689e097f78d0b1eb507b4181e1d6

  • memory/4132-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4132-6-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4132-13-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4132-20-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB