Analysis

  • max time kernel
    93s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 07:28

General

  • Target

    a2ef0248a002a6956d42dbb35479ba50N.exe

  • Size

    104KB

  • MD5

    a2ef0248a002a6956d42dbb35479ba50

  • SHA1

    cc846d705a699dbd016260f6185a450649d7d5a2

  • SHA256

    75e4eef9a99295ad6c605b904e28e303b0d347baf87b8f56acf5b6f71cbbcaf6

  • SHA512

    d63cd20b34a5f15b8d9d39cafa5cefb43c731077d7a1bf1626cbd161122f1376a947d72316c127e67cebf225b1744a1ae6e1e4386cc9ee01e4a9298b86f3aa81

  • SSDEEP

    768:W7BlpppARFbhjbhPKueKudLw1CnAkDanAkDFLj:W7ZppApB7cnAQanAQZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2ef0248a002a6956d42dbb35479ba50N.exe
    "C:\Users\Admin\AppData\Local\Temp\a2ef0248a002a6956d42dbb35479ba50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads