Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 05:35

General

  • Target

    488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe

  • Size

    5.6MB

  • MD5

    b15300a93e7cc445b6c774c50fa1e898

  • SHA1

    5017ad0a73b0a511163e75157ed4e5bf581d8965

  • SHA256

    488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7

  • SHA512

    2460cc00db5c0de2f1af118c41698efff5fdbc403008641e652470bb9304ab9ef2db9fde36a1203cc861f8b09aba897b71f8a0ff4a7d978b903cffcfbdf6cd24

  • SSDEEP

    98304:kgwqt5FqsP1+Wm04/Mq7kzzbmmRRV9NgjJF8IrGIRhdwsHETCCZ:kgXFqW1+h04/MpzzF/9NgVnxwY0Ce

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe
    "C:\Users\Admin\AppData\Local\Temp\488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads