Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 13:16

General

  • Target

    a.exe

  • Size

    2.0MB

  • MD5

    241acba8951adab717924a3cc88a1820

  • SHA1

    2afa1a57a696ae39bb8a87120bfe7a88efc16fda

  • SHA256

    53c1895ef1f23886eab7cc261ab9f6eb1a80e3ba2aa0837026ea864b9ee83f3b

  • SHA512

    758145a0ac18f8d7e4ea7363e93bd14573db16ee67bb30b531e610363e621124030c7e8c772aa6cb8c42a2a7bd1e84aa5bf28ff7ef19de566a5062e63325bb3a

  • SSDEEP

    24576:g90RDdY/xnhJwwatn47n1f80gq30PwJ7miXQyNhDAVhhNiUhR6YFOUbKmlUJzlu7:A80gq30PwJKsH2xiURbFUJ3U+kO3g

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a.exe
    "C:\Users\Admin\AppData\Local\Temp\a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2616-0-0x0000000000E70000-0x0000000000F89000-memory.dmp

    Filesize

    1.1MB