Analysis

  • max time kernel
    92s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 15:06

General

  • Target

    f9c91b4121ffe88c0842264fb308e715c5385eac1e0bbc004d5a5e92bc21c913.exe

  • Size

    2.1MB

  • MD5

    4f46d5e952c2801506f7c3d3938ceef7

  • SHA1

    a671ffde135e88d8ff8b39d3d84a4333a214fdd2

  • SHA256

    f9c91b4121ffe88c0842264fb308e715c5385eac1e0bbc004d5a5e92bc21c913

  • SHA512

    c512783c472904d5c47a0dde2ae86fa3e252deb4edc9e5eae2a01b9e74f29a14d48fec447b001ef4c70726616b714397b33a5795ff9125e9542303864947a06e

  • SSDEEP

    49152:2sY3uMpQAGtqAqVK32gGqyW4/wkhTi6RZNc2z8NT3F5O/:2nuMpPGYg3zAokhZ/T4N15

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9c91b4121ffe88c0842264fb308e715c5385eac1e0bbc004d5a5e92bc21c913.exe
    "C:\Users\Admin\AppData\Local\Temp\f9c91b4121ffe88c0842264fb308e715c5385eac1e0bbc004d5a5e92bc21c913.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4404-0-0x00000000749DE000-0x00000000749DF000-memory.dmp

    Filesize

    4KB

  • memory/4404-1-0x0000000000EC0000-0x00000000010DA000-memory.dmp

    Filesize

    2.1MB

  • memory/4404-2-0x0000000005AF0000-0x0000000005B8C000-memory.dmp

    Filesize

    624KB

  • memory/4404-3-0x0000000006140000-0x00000000066E4000-memory.dmp

    Filesize

    5.6MB

  • memory/4404-4-0x0000000005B90000-0x0000000005C22000-memory.dmp

    Filesize

    584KB

  • memory/4404-5-0x00000000749D0000-0x0000000075180000-memory.dmp

    Filesize

    7.7MB

  • memory/4404-6-0x0000000005AE0000-0x0000000005AEA000-memory.dmp

    Filesize

    40KB

  • memory/4404-7-0x0000000005DE0000-0x0000000005E36000-memory.dmp

    Filesize

    344KB

  • memory/4404-8-0x00000000749D0000-0x0000000075180000-memory.dmp

    Filesize

    7.7MB

  • memory/4404-9-0x0000000009C10000-0x0000000009F64000-memory.dmp

    Filesize

    3.3MB

  • memory/4404-10-0x00000000749DE000-0x00000000749DF000-memory.dmp

    Filesize

    4KB

  • memory/4404-11-0x00000000749D0000-0x0000000075180000-memory.dmp

    Filesize

    7.7MB