Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 02:35

General

  • Target

    4e36339be646b84744a90c88cc87b3930c9f1b4636f94bc7ae9af041d9ed3130.exe

  • Size

    956KB

  • MD5

    10d7bc6bc07b1d407393429b01e64ab8

  • SHA1

    ccbfc19cdd8303fb4faf25caf7672cc58f1bea0e

  • SHA256

    4e36339be646b84744a90c88cc87b3930c9f1b4636f94bc7ae9af041d9ed3130

  • SHA512

    95c04756018846bcfd2f9c9681b184cf1b5ed98577272a22c4f3b6eb4abc7a86f18babe706d41f5f192da0ea741d64f857b7e2d12faf874c6eb1cd8a3bae94b4

  • SSDEEP

    12288:XHgC35cfJwdrB+rAbNNhqaLQDm+eyBxK8p554pAb6Pi0XFY7JtnUI6:XXJchwgAf8a0LBVuubisY

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e36339be646b84744a90c88cc87b3930c9f1b4636f94bc7ae9af041d9ed3130.exe
    "C:\Users\Admin\AppData\Local\Temp\4e36339be646b84744a90c88cc87b3930c9f1b4636f94bc7ae9af041d9ed3130.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3884-0-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

    Filesize

    4KB

  • memory/3884-1-0x00000000002D0000-0x00000000003C4000-memory.dmp

    Filesize

    976KB

  • memory/3884-3-0x0000000005330000-0x0000000005396000-memory.dmp

    Filesize

    408KB

  • memory/3884-4-0x0000000074E30000-0x00000000755E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3884-6-0x0000000005820000-0x00000000058D0000-memory.dmp

    Filesize

    704KB

  • memory/3884-7-0x0000000005920000-0x0000000005942000-memory.dmp

    Filesize

    136KB

  • memory/3884-8-0x0000000005960000-0x0000000005CB4000-memory.dmp

    Filesize

    3.3MB

  • memory/3884-9-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

    Filesize

    4KB

  • memory/3884-10-0x0000000074E30000-0x00000000755E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3884-11-0x0000000006570000-0x0000000006578000-memory.dmp

    Filesize

    32KB

  • memory/3884-12-0x0000000006B30000-0x0000000006B58000-memory.dmp

    Filesize

    160KB

  • memory/3884-13-0x0000000006B70000-0x0000000006B78000-memory.dmp

    Filesize

    32KB

  • memory/3884-14-0x0000000074E30000-0x00000000755E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3884-15-0x0000000006BC0000-0x0000000006BC8000-memory.dmp

    Filesize

    32KB

  • memory/3884-16-0x0000000006E70000-0x0000000006EA8000-memory.dmp

    Filesize

    224KB

  • memory/3884-17-0x0000000006E50000-0x0000000006E5E000-memory.dmp

    Filesize

    56KB

  • memory/3884-18-0x0000000074E30000-0x00000000755E0000-memory.dmp

    Filesize

    7.7MB