Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 22:14

General

  • Target

    72f554d1fd9f3879843b523d355f8447b7a5f8faf9bb65ea749e66ea8533f027.exe

  • Size

    1.4MB

  • MD5

    eccf86f00e5cff7202b3af95112b2268

  • SHA1

    4ba4ff9400a20586cf1877969ca06b82703639bd

  • SHA256

    72f554d1fd9f3879843b523d355f8447b7a5f8faf9bb65ea749e66ea8533f027

  • SHA512

    c1b7d4b2dc2387799dc4dd4615e3b73b160523e8c7066269749dfa71c3d8fce58c0307abb4a8616f856b352c2ee6e0ce8915a59ef40dfa3ccd4585e1f4c65ef9

  • SSDEEP

    12288:Bi9B+VMn27WXJSBdQ6420jeaUOZ9eHCU74QIgqAvTxuFs:Bi9Bdn2yEBmprUoWC993bFs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72f554d1fd9f3879843b523d355f8447b7a5f8faf9bb65ea749e66ea8533f027.exe
    "C:\Users\Admin\AppData\Local\Temp\72f554d1fd9f3879843b523d355f8447b7a5f8faf9bb65ea749e66ea8533f027.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2752-0-0x0000000000400000-0x0000000000571000-memory.dmp

    Filesize

    1.4MB

  • memory/2752-1-0x0000000002460000-0x00000000024C7000-memory.dmp

    Filesize

    412KB

  • memory/2752-8-0x0000000002460000-0x00000000024C7000-memory.dmp

    Filesize

    412KB

  • memory/2752-12-0x0000000000400000-0x0000000000571000-memory.dmp

    Filesize

    1.4MB