Analysis

  • max time kernel
    96s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 09:21

General

  • Target

    e76ed020ce8b088e5b5146d91e3667f52c015c88b8a1142eabb5916fbb49f942.exe

  • Size

    459KB

  • MD5

    a016f3b09fba112a2c2e71d0e708cf81

  • SHA1

    ee1bb8c763170f8d513fa4f4512bf8a656ee29ca

  • SHA256

    e76ed020ce8b088e5b5146d91e3667f52c015c88b8a1142eabb5916fbb49f942

  • SHA512

    a88187b7d3911d4c966f0c8bc9dd20cd8b99235c36283cb39f207bfb0cfbca56a5bd8fe4a8586867ace897e65e64fdab47187000255a65d50b5ca76a99896821

  • SSDEEP

    12288:4yVJ4Exvb4xI1su+wIpOb3BJ/1wBjKwdjAg:Dbjxv4I11+/p8jyREg

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76ed020ce8b088e5b5146d91e3667f52c015c88b8a1142eabb5916fbb49f942.exe
    "C:\Users\Admin\AppData\Local\Temp\e76ed020ce8b088e5b5146d91e3667f52c015c88b8a1142eabb5916fbb49f942.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads