Analysis

  • max time kernel
    78s
  • max time network
    188s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-09-2024 06:31

General

  • Target

    0x000200000001e54d-225.exe

  • Size

    3.2MB

  • MD5

    9cf66b9ba3daaccb510ce72604db4203

  • SHA1

    c1a5b9aa6b0c61857000e4f5e519f40eae4f1ba8

  • SHA256

    10fa4f46acd467ff5ecf3c19acb0663f275fec8334259c8236a325c8124ea6ad

  • SHA512

    7c7bc0be1fa7d08862c4f83e2200111f6209052886e511fe41ae7f60b0e4557cc72e79c6b82aa50ba714366d9ef2ef981b5e4478bbadb2e308cc49839d63a6dc

  • SSDEEP

    49152:fdJYVM+9JtzZWnoS2VC23aun8+f5KuG2OY9IG9ivyv2cLx1RQY333TB/:1JYVM+LtVt3P/KuG2ONG9iqLRQY333T1

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000200000001e54d-225.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000200000001e54d-225.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4864-0-0x0000000000860000-0x0000000000861000-memory.dmp

    Filesize

    4KB

  • memory/4864-1-0x00000000008D0000-0x0000000000C16000-memory.dmp

    Filesize

    3.3MB