Analysis

  • max time kernel
    111s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 06:25

General

  • Target

    30757c11557fcfe61937b0d8ac63ac00N.exe

  • Size

    19KB

  • MD5

    30757c11557fcfe61937b0d8ac63ac00

  • SHA1

    7224165ec279df8bd57d948e3d0a869ddb9b010d

  • SHA256

    00a8a28221e4c3c6a0acd9576332101fc8f5426b4a108849662ad71da46636a4

  • SHA512

    671edd9412438b22037565b34bfdc716e839c3b5d87af8d14450e75db0e72be50b37578dfeb09b360615407d103a09ccd4fc25773bf5ee258c5b7acbd5aed5ba

  • SSDEEP

    384:bQZqSstnLmJ1d6dzkT8OwNrSfB73TtWMiS2R3Xbr17vvxlL:kqSsE1EdgT8rgDtWfSW3Lx7D

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\30757c11557fcfe61937b0d8ac63ac00N.exe
    "C:\Users\Admin\AppData\Local\Temp\30757c11557fcfe61937b0d8ac63ac00N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1236-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1236-3-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB