Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 18:13

General

  • Target

    bd36392f40a866a2c4114b85d0a54a093aa5a6be47ab6376645f90ef0aa73a95N.exe

  • Size

    139KB

  • MD5

    3a45dbefb1eed18cb067d24febe50c30

  • SHA1

    8e202e6e049cf45465eb29f76e7d1dfffee10009

  • SHA256

    bd36392f40a866a2c4114b85d0a54a093aa5a6be47ab6376645f90ef0aa73a95

  • SHA512

    cc8d3332280b8c14cbca51dc111a29f322a7d9378ea4786cb391259426e7ae48d9d4eab68ae0ca75f978c53f486eb88be01c43580a5cba0be404c7e2b5c7cb5f

  • SSDEEP

    3072:hs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/4/Fnncr5:hDeM7iNEkgiOb31k1ECGJq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd36392f40a866a2c4114b85d0a54a093aa5a6be47ab6376645f90ef0aa73a95N.exe
    "C:\Users\Admin\AppData\Local\Temp\bd36392f40a866a2c4114b85d0a54a093aa5a6be47ab6376645f90ef0aa73a95N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-jyXsmOaHI26GZS0U.exe

          Filesize

          139KB

          MD5

          c2998e3a8b41f43d7b43aee03d4833e8

          SHA1

          981f81d76c7b0cbd1d741ec3b6bdffef9b252c13

          SHA256

          92a09b2dae1e28fd9df8cc27414a43e59ab298bde64bea3c7fa0d7b4370cdea0

          SHA512

          30a3318b3bf1f8c9f6f268a1cdbedd999ea7e4de9c17d6bb939c4162273ec8a4be0e2081320223e646aec3f1277570c92a2071ce969aa54fa9498d6d9765e2c3

        • memory/3304-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/3304-7-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/3304-14-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/3304-21-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB