Analysis

  • max time kernel
    96s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:33

General

  • Target

    9bc70865e2a1b31ebfc6849dedf8b4291f12c07f8be5a3ee5320e2805b2b23fd.exe

  • Size

    164KB

  • MD5

    8bf1f9885feb5f3bae3b0e260d6e2a5d

  • SHA1

    62b7d06d10b769029ddd118e18b7c93ffa9350b6

  • SHA256

    9bc70865e2a1b31ebfc6849dedf8b4291f12c07f8be5a3ee5320e2805b2b23fd

  • SHA512

    87bc3120faa9535df3a88655c8f4913225028f91e2c1839fe39a1ca7800d88df281c81816f1ce21b3d4305bb6d4508a0e4ab179ba498a97c14d9239504705388

  • SSDEEP

    3072:gOpXEf2N0rcg4M7MOpsuF3WX9z8TtqXz+FoLW3qdCH6bL8DwR:gqCoxGMOOay9z8TtqjvLth34wR

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bc70865e2a1b31ebfc6849dedf8b4291f12c07f8be5a3ee5320e2805b2b23fd.exe
    "C:\Users\Admin\AppData\Local\Temp\9bc70865e2a1b31ebfc6849dedf8b4291f12c07f8be5a3ee5320e2805b2b23fd.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3012-0-0x0000000000F70000-0x00000000012BA000-memory.dmp

    Filesize

    3.3MB