Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 10:21

General

  • Target

    3610676cf0d883b415e3585aab0a65f4655ec333182367734b2b46b9b6f37083N.exe

  • Size

    140KB

  • MD5

    d95b90a0345ef0df2433cc94f529c790

  • SHA1

    df65518f544d028355b2989f5edbf76ec9927dd3

  • SHA256

    3610676cf0d883b415e3585aab0a65f4655ec333182367734b2b46b9b6f37083

  • SHA512

    e9040270c54d57d1eb93fb859dcd16436ea9fc8f6ce33519556cd9804e475e4982defbc7ec8a4e43243e11c8708348cd0029851f3e8850c8fa3d65f4815bd77b

  • SSDEEP

    3072:hs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/M/Fnncrd5971c:hDeM7iNEkgiOb31k1ECaJy5J

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3610676cf0d883b415e3585aab0a65f4655ec333182367734b2b46b9b6f37083N.exe
    "C:\Users\Admin\AppData\Local\Temp\3610676cf0d883b415e3585aab0a65f4655ec333182367734b2b46b9b6f37083N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1092

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-bomwTSVNtt0YWaDx.exe

          Filesize

          140KB

          MD5

          c782ecc92f0912f2b06eabe32d85d630

          SHA1

          7d88a98979189026a74707a734273800172a5b71

          SHA256

          cdc8474c19937fa52c785edfec0be61892e3ba079006011f243ab7e69b03f28b

          SHA512

          e5bad449b5103c3b7cac4d76e893a936eb1daa82fd1e2e9153588fba4d9feea1cef505f6358dda6252e8d220b6f3a52d67bf550a507ba760da55c3aa162257db

        • memory/1092-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1092-7-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1092-14-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1092-21-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB