Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:33

General

  • Target

    bb43eba3a8e8792e36d93e2c62c8f15fb1cfebccc98a94b3c2b4a051c92f7a1c.exe

  • Size

    6KB

  • MD5

    ea187fb031f817208b3344cee20ab38b

  • SHA1

    dfc3dc7bc0892634692d8febee175ab594b6a998

  • SHA256

    bb43eba3a8e8792e36d93e2c62c8f15fb1cfebccc98a94b3c2b4a051c92f7a1c

  • SHA512

    7438ddd40c9b6d76dc5f5641bd85dbe4281ce18a8e2e1e50d3ac9e681e1b1457650a3dad7ea0a5d43f730e621b0dec7c55393473ab269ea036bc29e8852df0ec

  • SSDEEP

    96:DZ+QjoUYy81SdID3IbdIhIHPdJNZ/XuwzNt:DoUW+HVPZ/+S

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb43eba3a8e8792e36d93e2c62c8f15fb1cfebccc98a94b3c2b4a051c92f7a1c.exe
    "C:\Users\Admin\AppData\Local\Temp\bb43eba3a8e8792e36d93e2c62c8f15fb1cfebccc98a94b3c2b4a051c92f7a1c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Program Files\Windows Security\BrowserCore\browsercore.exe
      "C:\Program Files\Windows Security\BrowserCore\browsercore.exe"
      2⤵
        PID:4208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2804-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

      Filesize

      4KB

    • memory/2804-1-0x00000000009A0000-0x00000000009A8000-memory.dmp

      Filesize

      32KB