Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 00:11

General

  • Target

    xscfbjx.exe

  • Size

    74KB

  • MD5

    08b101029a510d1467056305f8bda101

  • SHA1

    938d534e3584b132ece92f01e0089304b9587803

  • SHA256

    3d897c1632a6234082cafef209af7ddb9f91a0af33b03e6d004e153a54d622c0

  • SHA512

    631cc7c7a08b9492661983200ecc9b96c2d958d756808ed8b5b431a1a29ec92d360866c41c5d8307a3d185bcdedb4e66d661ec812d47d1ae057013a8cbc0ccbd

  • SSDEEP

    1536:xjLDJzMtIyKhdKim2R44oQWUs5PRoMLEEpt8vTlJssWXcd5CM+ea:xmIyKhwxQWUs5PRoMLBylh5CMXa

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe
    "C:\Users\Admin\AppData\Local\Temp\xscfbjx.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3304-0-0x0000000000C30000-0x0000000000C32000-memory.dmp

    Filesize

    8KB