Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 09:42

General

  • Target

    608f7bd4154d4fac945067f1f8ef6473589fde41e45a832b0d88c1a9de303616N.exe

  • Size

    139KB

  • MD5

    fbf097a7ecbd833ad37bb79164106ff0

  • SHA1

    1abad39c5d70af173dd33f6ffebc5303102d8d15

  • SHA256

    608f7bd4154d4fac945067f1f8ef6473589fde41e45a832b0d88c1a9de303616

  • SHA512

    202b5da48b78caf39623275c64db3e56ba7300d83dc3c403877836ea3852527cd491ef46501c3bf6e67db37594ad22db34b3de195fc7cbd11c92b837ca4f9023

  • SSDEEP

    3072:hs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/p/Fnncr5:hDeM7iNEkgiOb31k1ECFJq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\608f7bd4154d4fac945067f1f8ef6473589fde41e45a832b0d88c1a9de303616N.exe
    "C:\Users\Admin\AppData\Local\Temp\608f7bd4154d4fac945067f1f8ef6473589fde41e45a832b0d88c1a9de303616N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2040

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-LVBYp3Y3rcNguNBc.exe

          Filesize

          139KB

          MD5

          fd9b21094802a2f925f22cf30dbf8683

          SHA1

          6f14e46ed29386a7cdd2c846d89bffbea0e78b2d

          SHA256

          222ff8bba4b5b1cee712f298d30d7711d40909dbb0248e632f9d62b243b5ae6c

          SHA512

          a6b7cf81e9b296aa44a70c9a23c36fdc76aeade56592f889f92007e9ce5f767e34a61a19a473b67366183c32eebd7a38983f0daf0e44a0f27e2f5f8bfc1f7e27

        • memory/2040-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2040-7-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2040-14-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2040-18-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB