Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2024, 15:03

General

  • Target

    a34bfecbf575530e1a8972bd2676a2b4aa9997654cfc3428222e6fef19678751N.exe

  • Size

    1010KB

  • MD5

    8dfc10fc9fa194949ecca9bde84462c0

  • SHA1

    df3eb3c1ec337eb0c6736dcaf10684511bff90f4

  • SHA256

    a34bfecbf575530e1a8972bd2676a2b4aa9997654cfc3428222e6fef19678751

  • SHA512

    e1b963659d4e177a8ccdd70871b121e60e8cb28b7fdaaa7e2557d04e2324e02a72e41c06e54b3c3ead093ac7677ccc25ab1ceb22b58e3eb19fa19e63bc66a22d

  • SSDEEP

    12288:/rsMeaYjxyWbKZ5yaNGi/TJRxgRUyg1hpPLm4SounRmZyceiOg3Q1ZO5YP/kiVNx:wMePjxyw6gi/TFhpDKOn6bgY0C1Oaai

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a34bfecbf575530e1a8972bd2676a2b4aa9997654cfc3428222e6fef19678751N.exe
    "C:\Users\Admin\AppData\Local\Temp\a34bfecbf575530e1a8972bd2676a2b4aa9997654cfc3428222e6fef19678751N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads