Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 22:31

General

  • Target

    ecd1f01723f52279895587b09ea976337eec2decd700b02d70edd708ca6a857c.exe

  • Size

    164KB

  • MD5

    794d98c16c6f12a16b177e5a7b013021

  • SHA1

    df951fc374d7408fbc6eb6390a6ad2dfabcacdb0

  • SHA256

    ecd1f01723f52279895587b09ea976337eec2decd700b02d70edd708ca6a857c

  • SHA512

    667df4a8504c25f17db8e93512104d29f5431a0505ce69c0bf199f4e2b3ea3207694a037c6202d3a8a9b03f5bc3bb46bb0250f217f40c258a17551bfafedef0e

  • SSDEEP

    3072:SJgT32vJsLmol4M+7bt10H9JdBLz3DHmtvw9A7L2R/SUY0T9:hTWuiM+H30H9JdBL/eveAn2RHY0T

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecd1f01723f52279895587b09ea976337eec2decd700b02d70edd708ca6a857c.exe
    "C:\Users\Admin\AppData\Local\Temp\ecd1f01723f52279895587b09ea976337eec2decd700b02d70edd708ca6a857c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2444-0-0x0000000001860000-0x0000000001BAA000-memory.dmp

    Filesize

    3.3MB