Analysis

  • max time kernel
    96s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 14:51

General

  • Target

    d0768380f7dd3fd92c16d4397c1e9f40N.exe

  • Size

    100KB

  • MD5

    d0768380f7dd3fd92c16d4397c1e9f40

  • SHA1

    5c147a981002c80e0cc00503313c42f93c04ced8

  • SHA256

    9db7a59942e07c27f904ca477aecfed2ad31dcb8e3f199eb9af346357b7023e2

  • SHA512

    4ea8a9fa9462678e350145f177d9a811346e85bc710f9083ccf2b34e5fce3d8c450e9a06d6ca67f19384cd2273b938c92bfc321aa99ef440817a88140fbbc0ed

  • SSDEEP

    384:aNO/Zkdfw14uGkuK9ItjX+mbi1iCe0HL1JjFrClmiv4XVZpq4nd/uBjfM7:qO/ZuGYVOaS2VqL1JBrCl4fpHd/0U7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0768380f7dd3fd92c16d4397c1e9f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\d0768380f7dd3fd92c16d4397c1e9f40N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4448-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4448-1-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB