Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2024 19:31

General

  • Target

    $2.exe

  • Size

    2.2MB

  • MD5

    3c58ee787f100d9c124fde7d41e2b40c

  • SHA1

    794539da76db30d2193bc0e7f705a66816994773

  • SHA256

    9ba659ce26f5e4bc1dd98d7d41ac1514bb2853d68c3d56707f7a050cfb08ed87

  • SHA512

    2340c7f37ff53fcc9cecc77b0e87f6b86600f3cd08aa8bb0da87b9e041943cfcac87d6660187611cf7ee0eeb900a6f28272251bd60e0f2664da0e49c19667a5f

  • SSDEEP

    49152:OxpVf/Sa5WFtRnCU/6T2hzSBZvvT9dPZpU7Up9rXCGT5Sp/VZt6H/a:mSa5ICU/T8vTw7U7CtV/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$2.exe
    "C:\Users\Admin\AppData\Local\Temp\$2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads