Analysis

  • max time kernel
    119s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 08:35

General

  • Target

    11e54c5f3592c3dd047e27bcabe200b0N.exe

  • Size

    726KB

  • MD5

    11e54c5f3592c3dd047e27bcabe200b0

  • SHA1

    ea5eea0df17bee1c7a3d8403097b89835ef148f6

  • SHA256

    b31931877345e6b79b31d06d16c9dc16e9157291ac48ec91b42c70317c6cff69

  • SHA512

    ccf73700c38ccb98aff99e182adc2393e38a34e96c0b3287516b5d51d6a54e0ceafed9573ba5bea1fffa81731e9a58fc58a285fe17ee6237a22bd2b06c6b5896

  • SSDEEP

    12288:UbiD2nkQ/w+KLlvdmyoljTEC5AGry1F51is2ozw/WPn:wL/wXdLoljX5AKy1DYsPkW

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11e54c5f3592c3dd047e27bcabe200b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\11e54c5f3592c3dd047e27bcabe200b0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1488-0-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1488-1-0x00000000005A0000-0x00000000005A2000-memory.dmp

    Filesize

    8KB

  • memory/1488-4-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1488-5-0x00000000022C0000-0x00000000022C2000-memory.dmp

    Filesize

    8KB

  • memory/1488-7-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB