Analysis

  • max time kernel
    102s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 04:23

General

  • Target

    5c054bf9e58b93f2c192254e435c6a70N.exe

  • Size

    120KB

  • MD5

    5c054bf9e58b93f2c192254e435c6a70

  • SHA1

    d630ad8cb3b7c7cd4c9ce21c80927113323f12f2

  • SHA256

    290957fedf6326daeb1722c1522fa3fdccbddd543b75c42c3036149a5e3872e4

  • SHA512

    ab06302dbb59b75e6f837dd0971aa6d070a9e2162c5f0bd2f961625fd78f49f068ad98f254bd9712a265fb11c1bb322f08b01b5764a7673dacfccbf1b7cac082

  • SSDEEP

    3072:6+WpDfmRfmhJts8gHSXIBlf08qySzCeRS2W:wrRa

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c054bf9e58b93f2c192254e435c6a70N.exe
    "C:\Users\Admin\AppData\Local\Temp\5c054bf9e58b93f2c192254e435c6a70N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads