Analysis

  • max time kernel
    95s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:03

General

  • Target

    dde94103f20f97956266b0b71c1435e192aaf89b6533c4a0f7660ab0a5e2dab3.exe

  • Size

    249KB

  • MD5

    b089ba2a1831ff23608d78797e1ab8b7

  • SHA1

    98aa25a07a7eebc65657331f71f015813513d711

  • SHA256

    dde94103f20f97956266b0b71c1435e192aaf89b6533c4a0f7660ab0a5e2dab3

  • SHA512

    749f009da947a708b54b3838a5aab6f7dbdd8799784ea10b061ca8ffc8c8da9b08374eb21755b6a8b8082244d20f116572a125356e342679e07da9366ac7102c

  • SSDEEP

    3072:jbRBxl5NBHt8gj2NvGcStPgg7xm4zaY46tGNFC0VFtSxMk0JXXOeQ:Txl5NdygsvwtPggjF46tGfC0jtvbFOe

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dde94103f20f97956266b0b71c1435e192aaf89b6533c4a0f7660ab0a5e2dab3.exe
    "C:\Users\Admin\AppData\Local\Temp\dde94103f20f97956266b0b71c1435e192aaf89b6533c4a0f7660ab0a5e2dab3.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    PID:440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/440-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/440-2-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB