Analysis

  • max time kernel
    94s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 12:57

General

  • Target

    807002966ab982000c996c2ed0b008bd13e6e30c5189e3a77a37912a4d8c16eb.exe

  • Size

    3.5MB

  • MD5

    0795135fd23d5ce14063b782bae93c5e

  • SHA1

    b54a1ebc861b326260223da66a490ac59f751e4b

  • SHA256

    807002966ab982000c996c2ed0b008bd13e6e30c5189e3a77a37912a4d8c16eb

  • SHA512

    b166963459fae180c0e7a5151a552e46cb77805e3976c7cec25d15357d58208e163b1a60cc0674d7ca9ac46ff6ab875bad8c4b1f9353a1ef381773138852b83f

  • SSDEEP

    49152:SbjxOCTp7WGl6Ph1JO1ryWHJXI6nnVCzoV+m0t0FlSit+U6j5y98chJ5T:8xbgA1W4VvEPtql2pAG

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\807002966ab982000c996c2ed0b008bd13e6e30c5189e3a77a37912a4d8c16eb.exe
    "C:\Users\Admin\AppData\Local\Temp\807002966ab982000c996c2ed0b008bd13e6e30c5189e3a77a37912a4d8c16eb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads