Analysis

  • max time kernel
    110s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 20:34

General

  • Target

    025aaafc14694ed8ebfdda78fd8b3b80N.exe

  • Size

    156KB

  • MD5

    025aaafc14694ed8ebfdda78fd8b3b80

  • SHA1

    6baf5b1a3c168e3e81550e6daae8f9c831f2798f

  • SHA256

    1720c96909c6000e16f4aeeee0a7126d59829070bbfb614d1b006f8008f1a8e1

  • SHA512

    7d62911b424c908c3b6db8ae9762c44cc186e808c4a8101499617e2370d25fb8c688a15ca80ec32816b30c49d978303818151d6af6a605adf4e36eb261810f33

  • SSDEEP

    3072:1s3o8A4M3riN6MhGkgS3PL67n5OkhBOPC/j/Fnncry:1DeM7iNEkgi81ECzJ1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\025aaafc14694ed8ebfdda78fd8b3b80N.exe
    "C:\Users\Admin\AppData\Local\Temp\025aaafc14694ed8ebfdda78fd8b3b80N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/544-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/544-3-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/544-7-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/544-11-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB