Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 04:56

General

  • Target

    276c6f50e3c2db3728a070e512bb6945db24b36dca3ee99de92f082e00fe7a12.exe

  • Size

    1.4MB

  • MD5

    446c1a20e9618ebff9268388e6ea661f

  • SHA1

    f2abb7c76acfd3f84a838c7b794fc4c11af6996c

  • SHA256

    276c6f50e3c2db3728a070e512bb6945db24b36dca3ee99de92f082e00fe7a12

  • SHA512

    5060a60fd8fd7659495f7613e3c70f1ae3af73acb261ead48afae6536b2a1b2fcffdb3ffac84ce6e70543c49d494780c329e0f46fb6769f4673af73e761f8ded

  • SSDEEP

    24576:UbjxvMQ1u1Vrd5N2oagEr+dMZ+EMJUUtcTzL4cCvI7GGjEY/lzi:Ubjx060bNaCdMZSdtIdiI79jR/lu

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\276c6f50e3c2db3728a070e512bb6945db24b36dca3ee99de92f082e00fe7a12.exe
    "C:\Users\Admin\AppData\Local\Temp\276c6f50e3c2db3728a070e512bb6945db24b36dca3ee99de92f082e00fe7a12.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads