Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 00:00

General

  • Target

    ace0d24bccbe9b84e4318f17de3e512c1993cd852c59f405b48de8543e27f676.exe

  • Size

    310KB

  • MD5

    042ffa23de24bae1319fddd4a44fec3d

  • SHA1

    7c5533d2d0114a326f931c908bf7fdf90c8c5f8c

  • SHA256

    ace0d24bccbe9b84e4318f17de3e512c1993cd852c59f405b48de8543e27f676

  • SHA512

    5ecbe919a4d480b2a10ad4e8e654af7b2f367a28ca84cdf7124e5856b391a96d62e3a6852f5058b6fb6149aefef50b2631d8f5443cd1dbb98ae9da32d1821e3b

  • SSDEEP

    6144:GXYo7rEXdSrrkJmZNXuoBTj9HHKKedCFLqOXVZeuMneyk:Goo7rEXErrk0uoB1neCLqkmeyk

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ace0d24bccbe9b84e4318f17de3e512c1993cd852c59f405b48de8543e27f676.exe
    "C:\Users\Admin\AppData\Local\Temp\ace0d24bccbe9b84e4318f17de3e512c1993cd852c59f405b48de8543e27f676.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2016

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads