Analysis

  • max time kernel
    92s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 19:54

General

  • Target

    d0363fbed27704fee1bf2e8f688fb87d5caa2fa93a4399b4783b33fa91ee9a53.exe

  • Size

    160KB

  • MD5

    9d9b7eeb7194c071edce1b17357658a1

  • SHA1

    937cfabf0b52f467b6e4e1b69fdbac5638f78b41

  • SHA256

    d0363fbed27704fee1bf2e8f688fb87d5caa2fa93a4399b4783b33fa91ee9a53

  • SHA512

    a3f24c3716f180d52e7e0664b6267a725bfc5665341816e6bc0d3ecdaf273fd7940a56f1bfcace4c38d7d4aa2d5f5ced793647960c15fb89a04903ecbfeb228f

  • SSDEEP

    3072:fB1yv5ADXYgXzY1o22Bb+RU5ybrOndayYOMx5dp1AkSjP:j8+ko2Oaq5AOndayY31A3jP

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0363fbed27704fee1bf2e8f688fb87d5caa2fa93a4399b4783b33fa91ee9a53.exe
    "C:\Users\Admin\AppData\Local\Temp\d0363fbed27704fee1bf2e8f688fb87d5caa2fa93a4399b4783b33fa91ee9a53.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1488-0-0x0000000001A40000-0x0000000001D8A000-memory.dmp

    Filesize

    3.3MB

  • memory/1488-1-0x0000000001A40000-0x0000000001D8A000-memory.dmp

    Filesize

    3.3MB