Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 18:30

General

  • Target

    552.exe

  • Size

    2.3MB

  • MD5

    d661e288961c0a763d38ebf1f21ea820

  • SHA1

    9fb90d52041dc13ef11ede3cbe3692c2374ee109

  • SHA256

    7dbb5810e507999054252e310cb696dfdd3859504dc6421efe9b5527cf207eb9

  • SHA512

    548a1d57ef8c67707b316e0ca2fe10fe66392a3aeb2a516e360845141cfd5df70596d4693112b385e076699ba0b9fa82e9e42914a597808c60246223fc42152d

  • SSDEEP

    24576:Zelo5jh+9b8SL1lAdL5+FPI3YqOcHQSFablTmVfjxquGjHneFUJfK0OkjIY79MPm:0l+h+1qs0Y/BTmGuGjHnev0rBZ1B

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\552.exe
    "C:\Users\Admin\AppData\Local\Temp\552.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-0-0x0000000000940000-0x0000000000941000-memory.dmp

    Filesize

    4KB

  • memory/316-1-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB

  • memory/316-3-0x0000000000940000-0x0000000000941000-memory.dmp

    Filesize

    4KB