Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:15

General

  • Target

    85ab1cf884738c9acb9958f50fc180062a2efc6c9ae11622c0589f220376ef99.exe

  • Size

    164KB

  • MD5

    1859ae18d76cb77cf4ddadfc34243253

  • SHA1

    b8b82bcca654820c301b4ba44639409bcce62d72

  • SHA256

    85ab1cf884738c9acb9958f50fc180062a2efc6c9ae11622c0589f220376ef99

  • SHA512

    70c08cba87f8ccaca92658a59d7e078812d952697e446baf7524905e47cb50b3d84fb62bd6670bc4f5bebffb6a1492386019ed0d53273cc642fc6c45ac4febe4

  • SSDEEP

    3072:eAxpd12O6ZklHlMa5IXS8dwcG6TQW7axxcddVZSZDEMW:eApYOFMa6i8dwz6T/7uxC/cZDM

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ab1cf884738c9acb9958f50fc180062a2efc6c9ae11622c0589f220376ef99.exe
    "C:\Users\Admin\AppData\Local\Temp\85ab1cf884738c9acb9958f50fc180062a2efc6c9ae11622c0589f220376ef99.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1396-0-0x0000000000DF0000-0x000000000113A000-memory.dmp

    Filesize

    3.3MB

  • memory/1396-1-0x0000000000DF0000-0x000000000113A000-memory.dmp

    Filesize

    3.3MB