Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 23:58

General

  • Target

    293538dee8e2b08134c05a95c6eede10N.exe

  • Size

    156KB

  • MD5

    293538dee8e2b08134c05a95c6eede10

  • SHA1

    4bf789b23cdc9db48c67c60c6ad1d3447fb4dad2

  • SHA256

    d4e2c05ed6fd1163f1c6bbf274595a706399a2a0eecade57f9548eaac545ac2e

  • SHA512

    48d547121322981a3ce4474eef98a3e27385232b34ec23da514b59fd78ca50808017764a424b4989184e76d1e3df432c7f1ea3ff3db97a44ff3eb3aaffd75f22

  • SSDEEP

    3072:1s3o8A4M3riN6MhG0gS3PL67n5OkhBOPC/P/FnncrHM:1DeM7iNE0gi81ECPJ8M

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\293538dee8e2b08134c05a95c6eede10N.exe
    "C:\Users\Admin\AppData\Local\Temp\293538dee8e2b08134c05a95c6eede10N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5012-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/5012-3-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/5012-7-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/5012-11-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB