Analysis

  • max time kernel
    139s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 06:18

General

  • Target

    С·.exe

  • Size

    1.1MB

  • MD5

    4098ff52db5e8a83de9f0c3ebe576d1b

  • SHA1

    a9796d545ec0d8396cd83c4b1afb24e1dbaac17a

  • SHA256

    c903cf7a6e828f66fc3fc2727d2d5b551387b402fd59d8c88c44908e10abc075

  • SHA512

    d141d3611dfcebd2b547d3bae56ea1e9a59df452ec7be35ee876b7a687caac5eb3f9fdc930375add28f09383b7a000ee29d8787369b08c55a6e3c46e90b4176e

  • SSDEEP

    24576:MEjMMgxQ8e+KfuePOK9rOEF3bvOoKwsBr+2FD7YB+Ji:MEjMMgxreBueP19aIDIw8q2B7EGi

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\С·.exe
    "C:\Users\Admin\AppData\Local\Temp\С·.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2408-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2408-1-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB