Analysis

  • max time kernel
    111s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 22:59

General

  • Target

    32ddf6b89d11f167f972165d677db420N.exe

  • Size

    56KB

  • MD5

    32ddf6b89d11f167f972165d677db420

  • SHA1

    b5d497d0feba7a8296a13187112155273a4fac4f

  • SHA256

    5e1e6320892e1016028b9bb52e3657ed1c1734ff799f5f10f6bf6a1b6199a0aa

  • SHA512

    8fe327f4be54297add7b3ca25cfcbe06573eb9f893accf7902674307aef3ce68da883eb28426acf9fe317265c3d5ac2438daef36a31679b44a7eddfe313f6904

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJiZ/AZ/op3cg:/7BlpQpARFbhq1KSpMg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32ddf6b89d11f167f972165d677db420N.exe
    "C:\Users\Admin\AppData\Local\Temp\32ddf6b89d11f167f972165d677db420N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4288

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4288-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4288-1-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB