Analysis

  • max time kernel
    94s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 17:33

General

  • Target

    4cb5f7668d2012dc2f63a22125089e4d79d6f8133f9eb68f1c8f177ea27ea8d5.exe

  • Size

    4.9MB

  • MD5

    50d4de27ee6b2a1518d6dc17c2613df8

  • SHA1

    cef9f0cf38570a8ff069734e53c023125f0610ab

  • SHA256

    4cb5f7668d2012dc2f63a22125089e4d79d6f8133f9eb68f1c8f177ea27ea8d5

  • SHA512

    2057fd75fe2cbb80fb7387e7b12806e367c5d40088b5c0d3325a90e32cbcf877feec65697db277d36f0864cc098491e3899663cead05cd29a9ed40b7cb5f22d8

  • SSDEEP

    49152:r56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6liK1uOCeXvpnk:r56utgpPFotBER/mQ32lUe

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cb5f7668d2012dc2f63a22125089e4d79d6f8133f9eb68f1c8f177ea27ea8d5.exe
    "C:\Users\Admin\AppData\Local\Temp\4cb5f7668d2012dc2f63a22125089e4d79d6f8133f9eb68f1c8f177ea27ea8d5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads