Analysis

  • max time kernel
    94s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 12:15

General

  • Target

    5f1d0ab33100da61d547c8bbdd0e6be0N.exe

  • Size

    179KB

  • MD5

    5f1d0ab33100da61d547c8bbdd0e6be0

  • SHA1

    77ce0aacc3cdbec73ded2aaf1e8eb073d5cae399

  • SHA256

    d2c1c2ea70297ba1393e0f4ea51e3a20dade63c338b246b53d1bb5f6727e649d

  • SHA512

    6faf4e05794004122f754ee42185c9d8e5891f7feed28751a1273f79ce320fd10549446578b1c5ac74d00d8835cb245311f40679fb719320272f01e5fb790455

  • SSDEEP

    3072:6e7WpRaSljpniWHIjN3tj6qnv0b2UrXkbvLN:Rq/aGjLIjNDv0bNXkbvLN

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f1d0ab33100da61d547c8bbdd0e6be0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5f1d0ab33100da61d547c8bbdd0e6be0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads