Analysis

  • max time kernel
    111s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 16:43

General

  • Target

    1d264ff564b5f9ef9aa7688f0f91df2422faabc6154a7645a1777625a96d86e3N.exe

  • Size

    143KB

  • MD5

    82903b4744c98998d27f845896243740

  • SHA1

    d692cfdec8d1042b063b626c36b7d6009ea2fb9d

  • SHA256

    1d264ff564b5f9ef9aa7688f0f91df2422faabc6154a7645a1777625a96d86e3

  • SHA512

    42a6c939b0087af53cab0c8f60ac899d6946b02fba650caf4e6d2a11a404975f589c39e70d092a20a32ddd1c5a7f13d327931190a6473f488fe3d83e9ce97a6c

  • SSDEEP

    3072:es3D8A4M3riN6MhGkgS3PL6pb9t16n5NkhBOPC/Q/Fnncrd5971cw:egeM7iNEkgiOb31kiECeJy5Jl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d264ff564b5f9ef9aa7688f0f91df2422faabc6154a7645a1777625a96d86e3N.exe
    "C:\Users\Admin\AppData\Local\Temp\1d264ff564b5f9ef9aa7688f0f91df2422faabc6154a7645a1777625a96d86e3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-WlHIm7bnJlh3pp0s.exe

    Filesize

    143KB

    MD5

    dd7ab6bf4c68a4c34963d9f2435e6346

    SHA1

    01ee27d37f326fd7563d5b2c028f6504ef11f5d3

    SHA256

    dace59a44c8d22fcf10ebdd8ad7538d875962bfb8434220c2c8434b5cf920a59

    SHA512

    ba445550f8b502ff68b317c4a364a1d0fb877d1cf5f64a75d904aced62f6633f92098545e656fa5e357b89f588308a50b2528a14ad79a2e762884cf5304ddcb0

  • memory/1616-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1616-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1616-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1616-15-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1616-22-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB