Analysis

  • max time kernel
    110s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2024 07:47

General

  • Target

    a47fba8db49586fd180408648fc042f0N.exe

  • Size

    135KB

  • MD5

    a47fba8db49586fd180408648fc042f0

  • SHA1

    5a06b2546eb9e90294fe459edb83a7a4b72daba4

  • SHA256

    42599a88bf3126c7842d4b40fabe11bf4ad259c3b508143d32350567da850ef1

  • SHA512

    18ec7290f91604214f1aeba3225e5b38aaf5bb7f66d00c7dcca05cba3cbf392396ac7211b714b4dcad97c930aff39199ae35a82752385cf0c2b133107614cd6d

  • SSDEEP

    3072:is3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/G/Fnncrg:iDeM7iNEkgiOb31k1ECYJD

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a47fba8db49586fd180408648fc042f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a47fba8db49586fd180408648fc042f0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-JSJyJAWQnZJWZIQG.exe

    Filesize

    135KB

    MD5

    868d4c28f203d4404f47f7a32f9f0cd1

    SHA1

    8218d7812269233dc5c9f90311b99024cd941d31

    SHA256

    68a3e590e37abc4eb44803e764f09de5f6167cd76bb42bf618893d72064a2c96

    SHA512

    31cf7a327d07a3b3496dcc6484eb0f026b6cb27a808fc0009e6322336618d03de0416c8609e938716a3deb359917263a46ffe307b9488490861fcafc36de3bdc