Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 22:52

General

  • Target

    2801.exe

  • Size

    2.4MB

  • MD5

    bc18ac0a49ea8d7ff3ffcfbfa357e7fc

  • SHA1

    1be0d6bd13dd3a889c223f258ac2ed458830fbc9

  • SHA256

    2df7627111fa44ee8c5b7b165efcc6b0dd6489d1d18f41422bbddfb69f8553e8

  • SHA512

    ae06181858e684c9f66a76a4bbe205e4c8b887e34c6a0996467074bfd312c84e3f22f9d4d23012aab8aab9dab51be7cba2758199597635a7205d86143c8e400a

  • SSDEEP

    24576:Xelo5jh+9b8SL1lAdL5+FPI3YqOcHQSFablTmVfUxquGjHneFUJfK8SvjbrJUH:Ol+h+1qs0Y/BTmLuGjHnev8mbtUH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2801.exe
    "C:\Users\Admin\AppData\Local\Temp\2801.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4396-0-0x0000000000950000-0x0000000000951000-memory.dmp

    Filesize

    4KB

  • memory/4396-2-0x0000000000950000-0x0000000000951000-memory.dmp

    Filesize

    4KB

  • memory/4396-1-0x0000000000400000-0x0000000000640000-memory.dmp

    Filesize

    2.2MB