Analysis

  • max time kernel
    95s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 07:08

General

  • Target

    dca0dc64c0006bd61edc90efd4597ff32e2d0c1c24209945e55f483ffad45dfeN.exe

  • Size

    112KB

  • MD5

    220d72a91e5dc5959612826354ab48f0

  • SHA1

    c49339fa2498657f3dde971e2dfd6a4c872f94a1

  • SHA256

    dca0dc64c0006bd61edc90efd4597ff32e2d0c1c24209945e55f483ffad45dfe

  • SHA512

    729c283b642777c17754f80fa252d0eb61d325676ce9078c3f7ce0a81ab5b06996bdc02ea4546c521b4e78db0c27775ed85ffd50d5aeb343e9f7f5b0fd3cef86

  • SSDEEP

    1536:iYuoBLC0its9B2sE8CFxrgP5CLWFC+HXRnnT7ncodxl2sG:iYuoBLCbs9Ip8Io5+r+HBnvrd/2sG

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dca0dc64c0006bd61edc90efd4597ff32e2d0c1c24209945e55f483ffad45dfeN.exe
    "C:\Users\Admin\AppData\Local\Temp\dca0dc64c0006bd61edc90efd4597ff32e2d0c1c24209945e55f483ffad45dfeN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    PID:4216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4216-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4216-1-0x0000000002160000-0x0000000002172000-memory.dmp

          Filesize

          72KB

        • memory/4216-2-0x00000000021D0000-0x00000000021D1000-memory.dmp

          Filesize

          4KB

        • memory/4216-3-0x0000000000402000-0x000000000041E000-memory.dmp

          Filesize

          112KB

        • memory/4216-4-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4216-6-0x0000000002160000-0x0000000002172000-memory.dmp

          Filesize

          72KB