Analysis

  • max time kernel
    93s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 18:59

General

  • Target

    procdump.exe

  • Size

    773KB

  • MD5

    f2091c44d89789f689d98bc244358878

  • SHA1

    db1ef4ce56820c93a3b7f1fdf36d3fffc7d1ec96

  • SHA256

    e4ea34a7c2b51982a6c42c6367119f34bec9aeb9a60937836540035583a5b3bc

  • SHA512

    95fea3d3e28ac1b67bc7d5996d9af81da31f867bc47c27a0b1a3bed42d2c5347e4746a2a83d435176c6b483a2e387a8fa5fec80bcf745ec5b250ac6d646dfae5

  • SSDEEP

    12288:tGrcwkC4P93u+QLNaPmlkje+kjOf1lyJFG:tG8C4F3JQLomlee+kjUia

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\procdump.exe
    "C:\Users\Admin\AppData\Local\Temp\procdump.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:8

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads