Analysis

  • max time kernel
    106s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 21:37

General

  • Target

    55e9d1e0a011449aa66e35695de3b1af9527fa0ae18a963b673d49b1b2972aaa.exe

  • Size

    931KB

  • MD5

    0e039ec208bd952a753dd2a3e05079cf

  • SHA1

    e451f181fafa1228d459c6c8f4f5e9664676aba8

  • SHA256

    55e9d1e0a011449aa66e35695de3b1af9527fa0ae18a963b673d49b1b2972aaa

  • SHA512

    14cef3d8a3fb9d82d040d4f0ffdce1d0e889112e91e449173b7b182e17bfc1f3dd5fbf841868085d35b4df1c13a54658414826d2098c603d8e30bd4f5cf86b9e

  • SSDEEP

    24576:4sxp94KktTLzfZSm1lwqed1zKzQfaoqBhtJmbUJJpL:XS7TLzfZSsw9dZKzQiHNJfJpL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55e9d1e0a011449aa66e35695de3b1af9527fa0ae18a963b673d49b1b2972aaa.exe
    "C:\Users\Admin\AppData\Local\Temp\55e9d1e0a011449aa66e35695de3b1af9527fa0ae18a963b673d49b1b2972aaa.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads