Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 07:38

General

  • Target

    880afa0ae83bb2e185793f24d764e730N.exe

  • Size

    156KB

  • MD5

    880afa0ae83bb2e185793f24d764e730

  • SHA1

    ec0fd9a1fc8d7127a9cefa9adf31de2da7034f98

  • SHA256

    a9b22b64da184a61efebc93579342fe800addebf6874b3a169a3d5c3d9be8a50

  • SHA512

    bc5492b6b5e0dbb36202b49a373ad55f2b61253b7a24c06bb05dfcf4586dc77e136b49de5aecba1dd96758a0334d027a1879c5bec2f9affc57d50525381b8ccf

  • SSDEEP

    3072:1s3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/5/Fnncre:1DeM7iNEkgiOb31k1ECFJJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\880afa0ae83bb2e185793f24d764e730N.exe
    "C:\Users\Admin\AppData\Local\Temp\880afa0ae83bb2e185793f24d764e730N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1232-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1232-3-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1232-7-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1232-11-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB