Analysis

  • max time kernel
    111s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/11/2024, 10:21

General

  • Target

    7d74829037cc3430e488432d39a4be0d88844edc5678816288865bedb629f743N.exe

  • Size

    139KB

  • MD5

    0bc646a1d878ab9be2b56cd7979e47f0

  • SHA1

    a00a350c2c9a779dbedb1016ee27952dca317618

  • SHA256

    7d74829037cc3430e488432d39a4be0d88844edc5678816288865bedb629f743

  • SHA512

    a0befe5008d01840b46f0589b9787a01b199d314388cca682365fa98eabf7dd339d3cdd9d6cbda0dccc0312195c6c994c3c1d49af9c7170a9c4568fe8f22fcb4

  • SSDEEP

    3072:hs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/w/Fnncr5:hDeM7iNEkgiOb31k1ECeJq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d74829037cc3430e488432d39a4be0d88844edc5678816288865bedb629f743N.exe
    "C:\Users\Admin\AppData\Local\Temp\7d74829037cc3430e488432d39a4be0d88844edc5678816288865bedb629f743N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\rifaien2-VzGfX1otnbWzYCSk.exe

          Filesize

          139KB

          MD5

          6f09e4a493b1af938d59bccddb899049

          SHA1

          30f49fd5091676de06b47db5fb6ab15409a320a9

          SHA256

          2c7487128389bfb7ddf5a6baeff76cee5df99a8cb47a2732c85ef75e2b7967ad

          SHA512

          79467447d389ebaedc2226954cb694449ca1ad3b483714f191c3f25b0ab64a10f49c7843b93b5c56ea94858e3d1396cbe69f460ce3d0ca3482da68d9c0ca2d22

        • memory/2116-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2116-7-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2116-14-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2116-21-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB