Analysis

  • max time kernel
    22s
  • max time network
    25s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 05:12

General

  • Target

    MeltingScreenEffect.exe

  • Size

    5KB

  • MD5

    a176d1cdd73ffefedc75262e203a5179

  • SHA1

    c33941963fabab4137ad83c5381f22348c06001f

  • SHA256

    88e8c300880131a8fa378f5d0ea13a1bc7e59a9e6f16f8c4a4e924cfba02ab51

  • SHA512

    f4d1d6318c8be6eb3a342fbdf9da527d7ae43ab8267974858eed85b97cda3ac382d017e80911148f3ee4520924da1c1427d0badcb4817379cb4eded753cca7ea

  • SSDEEP

    96:VUgHwML12T6ViLZ4p9zaoY8xVk8+EudVvLFzNt:mrMLvwZC5aoY8xVk8SNj

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\MeltingScreenEffect.exe
    "C:\Users\Admin\AppData\Local\Temp\MeltingScreenEffect.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4256

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4256-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

          Filesize

          4KB

        • memory/4256-1-0x0000000000D00000-0x0000000000D08000-memory.dmp

          Filesize

          32KB

        • memory/4256-2-0x0000000005C10000-0x00000000061B4000-memory.dmp

          Filesize

          5.6MB

        • memory/4256-3-0x0000000005700000-0x0000000005792000-memory.dmp

          Filesize

          584KB

        • memory/4256-4-0x0000000074D60000-0x0000000075510000-memory.dmp

          Filesize

          7.7MB

        • memory/4256-5-0x00000000056D0000-0x00000000056DA000-memory.dmp

          Filesize

          40KB

        • memory/4256-6-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

          Filesize

          4KB