Analysis

  • max time kernel
    130s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 03:36

General

  • Target

    Dumped_.exe

  • Size

    72KB

  • MD5

    afc0e1b3c683fcfb276f8e054d733945

  • SHA1

    a1ef6e368f78bc147c2ee70449917f3929d669ed

  • SHA256

    86a4ec02684bfd8a055929b0aa6f687bd54e80da0ed689be4e315adf76edbbcb

  • SHA512

    68adc819478468c55e85d9cb476b94a363f7d90df1697cd1a1814180ca1dfb47cba4f584d6706330c7d7e2b1e26092c780345cb59bdf736daf4616f06fae7ce7

  • SSDEEP

    768:0Nt2Lmmi8euodnS53h1O8jFQ3tuL7EAj+WTbibIKFQnjVPoxPaBF77tiU8r:nLZOQRM8Jg12+q7LnjVP0U

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dumped_.exe
    "C:\Users\Admin\AppData\Local\Temp\Dumped_.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    PID:3872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\cawjdzyliposrdr

    Filesize

    52B

    MD5

    af8c3a1898f41d3a338cdcff4f0587d9

    SHA1

    c665d6f2ea8b905667b51f07377aaf81e447f306

    SHA256

    21419d7a0aa72bc59bc6b33255b521d41857a66cc08def7f889c4b74ec94e60e

    SHA512

    1655e2ac73d089cc88a36b3302ed5312be2fae115d70da50c7a9d5bad7d1d34a63e45ab8562ecf64059adc8ab2b6f2ac4ecf9a4453a83703f912be9fffdd6f8c

  • memory/3872-0-0x00000000008D0000-0x00000000008E2000-memory.dmp

    Filesize

    72KB

  • memory/3872-4-0x00000000008D0000-0x00000000008E2000-memory.dmp

    Filesize

    72KB