Analysis

  • max time kernel
    101s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 02:22

General

  • Target

    d4350ad9a40445532be12b9764782760N.exe

  • Size

    84KB

  • MD5

    d4350ad9a40445532be12b9764782760

  • SHA1

    40db35853b63cfebedcda68cf9ad7657ca11f31c

  • SHA256

    432b5d4ceba7dab13fc85cdfee903d87b1e54ef42fc6a76ee6193f4d734ccce4

  • SHA512

    55c68336bec572dfd86a1fa63d9159b0c533908b2590e26363b6666697b581a22c62e65def0272673f69f7f1550a7087c78892a2cc79dc5a0950a9139da7c3c3

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DvE0mRvhktp/E0mRvhktpa:9QWpze+eJfFpsJOfFpsJ5DvE0mRvhktS

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4350ad9a40445532be12b9764782760N.exe
    "C:\Users\Admin\AppData\Local\Temp\d4350ad9a40445532be12b9764782760N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5004-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/5004-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB