Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:00

General

  • Target

    9388d7e69f2d418a13932d577ac8f8bb6349166184cf53b39e0e6681fec203ae.exe

  • Size

    164KB

  • MD5

    51341a171ea7575ab84b7d6028ee52d5

  • SHA1

    a2e9178dc95d4bb563a5c8304c857c740a7a19e7

  • SHA256

    9388d7e69f2d418a13932d577ac8f8bb6349166184cf53b39e0e6681fec203ae

  • SHA512

    c49f201f881c5ef6526d15dc7d3617b7dfd01b1de1d700ea726d3b18ff59cc5c1227c404fc07a8bd45750d76e89755266daf76c3f081ccb384a4e7d8e916fa4e

  • SSDEEP

    3072:/Jpux2H2q/2VtMBEUOPyjNxjaeD3ARpLU77ZBGwkSRc7Pg:/ulHMBTMUNxjaGAR2gSRc7P

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9388d7e69f2d418a13932d577ac8f8bb6349166184cf53b39e0e6681fec203ae.exe
    "C:\Users\Admin\AppData\Local\Temp\9388d7e69f2d418a13932d577ac8f8bb6349166184cf53b39e0e6681fec203ae.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4316-0-0x0000000000DA0000-0x00000000010EA000-memory.dmp

    Filesize

    3.3MB

  • memory/4316-1-0x0000000000DA0000-0x00000000010EA000-memory.dmp

    Filesize

    3.3MB