Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 06:16

General

  • Target

    105ff441d4973fa1175f83cecdf882c0N.exe

  • Size

    59KB

  • MD5

    105ff441d4973fa1175f83cecdf882c0

  • SHA1

    ebb85aa18d630dd51eac09ffcf7df5e978642e93

  • SHA256

    821eec24a2314af17e56b340236f099004e3594f64e733903e90a7f0cd3d5d4a

  • SHA512

    836840965de8499ed95ee8ea133203933ab3aaf1dcb57eb3eefc99c569dfb1249c5e66ca67312ab16231b597c2f5447508c10f421128e676df8919a1322f50bf

  • SSDEEP

    768:DgFU+QYL+KgrX1EAjC4GXe1m0tQzHfzFC83fBt8fUVjz:iUVYL+KgrX1jm0tQrfRl3f3Rjz

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\105ff441d4973fa1175f83cecdf882c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\105ff441d4973fa1175f83cecdf882c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3412-0-0x0000000001000000-0x0000000001012000-memory.dmp

          Filesize

          72KB

        • memory/3412-1-0x0000000001000000-0x0000000001012000-memory.dmp

          Filesize

          72KB