Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 13:39

General

  • Target

    f3f1362246cfb23e7136ba957d647a6c403ee7bbc7cfd7c2d9489b63e40c5bb3.exe

  • Size

    342KB

  • MD5

    d5da40f4a58f1a84dbdc034834d70eaa

  • SHA1

    8f63f847b9005a841a979fc37c60df370e966892

  • SHA256

    f3f1362246cfb23e7136ba957d647a6c403ee7bbc7cfd7c2d9489b63e40c5bb3

  • SHA512

    cb974501f6bea363616a0286b10a8f80a0ed41a900e080f189903b1b6b4524fe10cb2ba911046dee8138df9262f923d202c15ba8a276591a20978388c246978e

  • SSDEEP

    6144:BDW3RMVNnE/ApfzkyPH6v+Qu3tFY1gLIDvAG+GLWVuDCr:QyVJ4ExvfQu3tFJ8LAGbLW4mr

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3f1362246cfb23e7136ba957d647a6c403ee7bbc7cfd7c2d9489b63e40c5bb3.exe
    "C:\Users\Admin\AppData\Local\Temp\f3f1362246cfb23e7136ba957d647a6c403ee7bbc7cfd7c2d9489b63e40c5bb3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads