Resubmissions

02-12-2024 16:47

241202-vamktsspat 10

06-02-2023 04:24

230206-e1d4dafd8x 8

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 16:47

General

  • Target

    payload.bin.exe

  • Size

    107KB

  • MD5

    3e2fd3c6aef426ee110e27a2a0ce1f8b

  • SHA1

    35966d13bbfbe4a85478343b35d1b4d5297fcbd1

  • SHA256

    f2cde4100fdbb5841b0f68e1c5dbba912b38478e64698c0238edb62415d1ad70

  • SHA512

    48d6792fe887e5e027c8bb66f9780bc64367440a2346a6327ca3ca9cb8f67b69129fdfd29f23edbfeb2f1d60c4bf4119a0413e19c3a48dfe2386dc9fc5733052

  • SSDEEP

    1536:Bpaiq0I2XvL/5kVvpyITHAOEH8pIZ+msXvsfJre8oJ1C7uj9m:BpaikE/5SppIZ+m2sfJrebJF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\payload.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\payload.bin.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads