Analysis

  • max time kernel
    134s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:48

General

  • Target

    e1086c1ed954f6772e53cc82f64c534fa68b486eb448311a023dd4386a32d2ff.exe

  • Size

    232KB

  • MD5

    6c23466671459ea2216161827532ca52

  • SHA1

    7df04a40043f5cecd4df8522fe8f5248358343ef

  • SHA256

    e1086c1ed954f6772e53cc82f64c534fa68b486eb448311a023dd4386a32d2ff

  • SHA512

    e55c91608c5f39af2a73bf4090310a4f0355a2f75c3a5b092a6f49970a987f27d78a24e6dc5f423c6f9de157cfc0fa3c4f0e4b87070f4b2de147dded3f579706

  • SSDEEP

    3072:aRLiYu+vf3ybLycGuN+e8+Sjv21gy7pYq8+BvZdRpigtTrS:gZuoSN+5qn7jBxpPrS

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1086c1ed954f6772e53cc82f64c534fa68b486eb448311a023dd4386a32d2ff.exe
    "C:\Users\Admin\AppData\Local\Temp\e1086c1ed954f6772e53cc82f64c534fa68b486eb448311a023dd4386a32d2ff.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\giwefkwfiw

    Filesize

    54B

    MD5

    c7559822981dcbd1c3af485de7d2ae8d

    SHA1

    09a280d67ac8b9eaf4fa226ba9c262d71a6e42d5

    SHA256

    f5c94ba76ae48e8ef1075ad525b7ef6f6dd25da60e0fe0422dee26e030c9b8e0

    SHA512

    0c110683a3cc420b92303f6d266de9a7b893dc04c5fd1f0262c3b08124b01ece7083ed48648405f94d530fdab7e177524495ccde04ceb6dac5d88b1758ae263c