Analysis

  • max time kernel
    93s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:13

General

  • Target

    193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304.exe

  • Size

    168KB

  • MD5

    b638340fbf88bef5a2b9593c5e083a4d

  • SHA1

    fe7ff6c329e631c36e95223f86696388a3a942fe

  • SHA256

    193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304

  • SHA512

    006e473c2dadf4bc338091c829e3509e35c6d587aa16a4abfa2bf7ad338a4432949a6c6382da6ec4b027aeac3bba0a2c5c9327bef3d0cbbdf80edcc59243c694

  • SSDEEP

    3072:ggp8g2CJKhmYkMKSY+ybdd9Z4BG/fsQ4KFWxapuaqTkp:gDe3FMKp9bddH4BSsQ4Kl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304.exe
    "C:\Users\Admin\AppData\Local\Temp\193463cdb6b20ba198803b1ae33beae998a22bb99e4355b9a7a709d9c3d86304.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4820-0-0x00000000010F0000-0x000000000143A000-memory.dmp

    Filesize

    3.3MB

  • memory/4820-1-0x00000000010F0000-0x000000000143A000-memory.dmp

    Filesize

    3.3MB