Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:13

General

  • Target

    beeb933d3ceba05d9a5ae1660bf98ea2602c4ebdef322178e6e964f73d806f5e.exe

  • Size

    164KB

  • MD5

    42912ba20fcd6b8282a52366bd8ceb63

  • SHA1

    5908701a51ba60543c504fe0ebb269cc2e71ccb5

  • SHA256

    beeb933d3ceba05d9a5ae1660bf98ea2602c4ebdef322178e6e964f73d806f5e

  • SHA512

    1d36afaf2ac6d2416d2f30f29a2d809e5f9fcd2148048947366676705d9e1a18d3c76b0c57f2d857fb64bfed5173476d71eafc9ffb8f746e79ef82b1fb169d46

  • SSDEEP

    3072:lApUs2QkEm4FrBmMvdG/g4HyMK5QjpZh3CNzJDmEhc9r:lno38MvdqxSMNjp6NzJago

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beeb933d3ceba05d9a5ae1660bf98ea2602c4ebdef322178e6e964f73d806f5e.exe
    "C:\Users\Admin\AppData\Local\Temp\beeb933d3ceba05d9a5ae1660bf98ea2602c4ebdef322178e6e964f73d806f5e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3308-0-0x0000000000D30000-0x000000000107A000-memory.dmp

    Filesize

    3.3MB