Analysis

  • max time kernel
    141s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 02:36

General

  • Target

    f95f203c80586c9e6ea078bc983f690e8b15c6e133e70554fb75b3469e3dae17.exe

  • Size

    969KB

  • MD5

    61bcb3651d4e1fa2842add1dca03a251

  • SHA1

    250ec0b8267210a9e345c141cb0ae9b42ca23ffc

  • SHA256

    f95f203c80586c9e6ea078bc983f690e8b15c6e133e70554fb75b3469e3dae17

  • SHA512

    4b247fcc4085445fe199ca1efc3b323f4b6c96a28d9952d021d7be70e5e0a38056e0c93af0ccce3c6342c8de0e24d18b87119331617a5b8159167617c7a47e5a

  • SSDEEP

    24576:Po+Kayhn89NJZzyYawQpDlcjHEbW8R1KlQddBEdgjFlF:Po+5s89LZzyYawscjHOW8f3lzlF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f95f203c80586c9e6ea078bc983f690e8b15c6e133e70554fb75b3469e3dae17.exe
    "C:\Users\Admin\AppData\Local\Temp\f95f203c80586c9e6ea078bc983f690e8b15c6e133e70554fb75b3469e3dae17.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4600-0-0x0000000002250000-0x0000000002251000-memory.dmp

    Filesize

    4KB

  • memory/4600-1-0x00000000023D0000-0x0000000002450000-memory.dmp

    Filesize

    512KB

  • memory/4600-2-0x00000000776B2000-0x00000000776B3000-memory.dmp

    Filesize

    4KB

  • memory/4600-3-0x0000000000400000-0x00000000004F6000-memory.dmp

    Filesize

    984KB

  • memory/4600-5-0x00000000023D0000-0x0000000002450000-memory.dmp

    Filesize

    512KB