Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 16:14

General

  • Target

    848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe

  • Size

    417KB

  • MD5

    59e2c2cec52d4976893f9e4fce67b3c0

  • SHA1

    60a7ff7258b98dcab0025c488be47255c3c3da31

  • SHA256

    848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444

  • SHA512

    c069c97fac15550176c371069de84bd6f00012abcd9f4f1bd9c45288eac4ab28c981e1be4c82d953f2d5568b9f2841c6c588b0c9f025e36584ea2b3df52a73ac

  • SSDEEP

    3072:z4fP8fWEwFLU1tRFe4VAWOy3PNJTS4cZ2gxjVfuE1AT/i:zFWEw1UvUVs/T6Z2QJmE1AT/i

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 16 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe
    "C:\Users\Admin\AppData\Local\Temp\848a278dd32c3d471eff6415d1dd30fd2b7a5abe709a0a63ad59a2ebef756444.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1456

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1456-0-0x0000000000A70000-0x0000000000A92000-memory.dmp

          Filesize

          136KB