Analysis

  • max time kernel
    93s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 10:05

General

  • Target

    3d4525ff7e82e85fe4dc2f7e2a9b1b44e1139bbec12142806924c0f853da87f8.exe

  • Size

    3.6MB

  • MD5

    23091acd3e6a2112a78762c5bc27e24d

  • SHA1

    9b4f29b534a7a2ab5d671226539be47f9b9d06a4

  • SHA256

    3d4525ff7e82e85fe4dc2f7e2a9b1b44e1139bbec12142806924c0f853da87f8

  • SHA512

    1ad18ccdcc2919e0d5311237a2936d1e3010bc60aa70c7329354968038ae47203fae5a5cff9e8dc8fed52650c75f290d97f594b19c71e919098c92d926fbdae7

  • SSDEEP

    98304:SxsWk61E8U+XwRaXtRgtOZCo9xNygN0A7WLnIg:8sOn5wRaXtRgtOlxN9NoLI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d4525ff7e82e85fe4dc2f7e2a9b1b44e1139bbec12142806924c0f853da87f8.exe
    "C:\Users\Admin\AppData\Local\Temp\3d4525ff7e82e85fe4dc2f7e2a9b1b44e1139bbec12142806924c0f853da87f8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads