Analysis

  • max time kernel
    98s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 03:01

General

  • Target

    7d74362ee3425bb2c4d7683583b39e50N.exe

  • Size

    145KB

  • MD5

    7d74362ee3425bb2c4d7683583b39e50

  • SHA1

    7cdc42cc1faf460fa934a9bbefe59c9c35bba695

  • SHA256

    2a05fc07b0a28e2ec4bb0c1df688081ea62c80767d1319e50c531e151ca61579

  • SHA512

    b9f740af8b3870a9b3f4b1a5ae3126d75749f352201c503fe1713bd6575d9c60425a718026e7b5f1265ff9048db89a0736495f48f003f50075eae564d4103cff

  • SSDEEP

    3072:9QWpze+eJfFpsJOfFpsJ5D66W2QZwKS7z:Lpe+ewDe2ZKS7z

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d74362ee3425bb2c4d7683583b39e50N.exe
    "C:\Users\Admin\AppData\Local\Temp\7d74362ee3425bb2c4d7683583b39e50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3416

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3416-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3416-1-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB