Analysis

  • max time kernel
    110s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 03:46

General

  • Target

    6cbcd96e342f6aab3a22876b85ba4f70N.exe

  • Size

    1.0MB

  • MD5

    6cbcd96e342f6aab3a22876b85ba4f70

  • SHA1

    a771608b97bc6af4ba1a8806078caa4cdd40ed2b

  • SHA256

    2cbf95909eefee71c3198da53bfa2c551d2440bd49d0e33ef9c1aeecb184926c

  • SHA512

    a16ad6ff2df8b829090ac44574d0768e91385b3e98af03d57f3107869fc38b55803a0159b47a5b1b6dc2b09cd17a50fde4222aa383c780fd95c8b36e33abc954

  • SSDEEP

    24576:VQ1OIyYqCfVk4Ym/jTnGDcZELIveNN4wgarv84IA79unQMg:VQ1Q6y4YmrVeNSurv84IA79unQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cbcd96e342f6aab3a22876b85ba4f70N.exe
    "C:\Users\Admin\AppData\Local\Temp\6cbcd96e342f6aab3a22876b85ba4f70N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2016-0-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB

  • memory/2016-1-0x0000000002290000-0x0000000002292000-memory.dmp

    Filesize

    8KB

  • memory/2016-4-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2016-5-0x00000000022C0000-0x00000000022C2000-memory.dmp

    Filesize

    8KB

  • memory/2016-7-0x0000000000400000-0x0000000000541000-memory.dmp

    Filesize

    1.3MB