Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:17

General

  • Target

    65bd05ff95c28872f1d9efbc67d1609d7536043b6e9adeeb7beee88327defe4b.exe

  • Size

    232KB

  • MD5

    e5d041cdd467e228088308cefa589a13

  • SHA1

    17dc8e2e3636631614feef18a1cca041f0dce787

  • SHA256

    65bd05ff95c28872f1d9efbc67d1609d7536043b6e9adeeb7beee88327defe4b

  • SHA512

    681eb263887f7a4733374b6b62f48fd637cf898981106cff4fd80755576dbde8d771edf26bcebf201ed1ad2c20801ea9db8c78da97b2e503340d581312b06416

  • SSDEEP

    6144:cApYOFMa6i8dwz6T/7uxC/cZDMfEQM0B4f:cih6iYwa7OCof

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65bd05ff95c28872f1d9efbc67d1609d7536043b6e9adeeb7beee88327defe4b.exe
    "C:\Users\Admin\AppData\Local\Temp\65bd05ff95c28872f1d9efbc67d1609d7536043b6e9adeeb7beee88327defe4b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3364-0-0x0000000001B20000-0x0000000001E6A000-memory.dmp

    Filesize

    3.3MB

  • memory/3364-1-0x0000000001B20000-0x0000000001E6A000-memory.dmp

    Filesize

    3.3MB