Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2025 12:14

General

  • Target

    Base.exe

  • Size

    2.1MB

  • MD5

    a8047e04ac05a799af9e555e60f30f35

  • SHA1

    b0e7c2b8f0cb0dc576a1f54d82c31f4311e3c3e0

  • SHA256

    7c2d568ce2d9d0de14ed9623f01d2346218dd917edb9c58b9e044238104b668f

  • SHA512

    43ed42b1ff266fa8bc591519aed7d72dbbe7543b807858834092e7175991ead5a976fd42ebee8a91fd62a1061acd76f2f58d7b10c6ccf22ae767dea5e6fc4203

  • SSDEEP

    24576:qwc4IHNdRmoFXbrKmgB76DhxlrIYSRzBLSw8ELSV5zjatQoEe00ykzcubKHnXzU:c587m/+RzlSw8g8zjaWexvh2A

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Base.exe
    "C:\Users\Admin\AppData\Local\Temp\Base.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:8
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTA5OTMyMTA5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/8-0-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-1-0x0000000010500000-0x000000001050B000-memory.dmp

    Filesize

    44KB

  • memory/8-2-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/8-4-0x00000000001F0000-0x00000000001FA000-memory.dmp

    Filesize

    40KB

  • memory/8-3-0x0000000000A90000-0x0000000000B7A000-memory.dmp

    Filesize

    936KB

  • memory/8-6-0x0000000000CB9000-0x0000000000CBA000-memory.dmp

    Filesize

    4KB

  • memory/8-5-0x0000000000BD0000-0x0000000000CBA000-memory.dmp

    Filesize

    936KB

  • memory/8-7-0x0000000010200000-0x000000001020D000-memory.dmp

    Filesize

    52KB

  • memory/8-8-0x0000000010400000-0x000000001040F000-memory.dmp

    Filesize

    60KB

  • memory/8-9-0x0000000010100000-0x000000001010B000-memory.dmp

    Filesize

    44KB

  • memory/8-10-0x0000000002B40000-0x0000000002B82000-memory.dmp

    Filesize

    264KB

  • memory/8-11-0x0000000002B40000-0x0000000002B82000-memory.dmp

    Filesize

    264KB

  • memory/8-12-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-13-0x0000000000A90000-0x0000000000B7A000-memory.dmp

    Filesize

    936KB

  • memory/8-15-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

  • memory/8-14-0x0000000010500000-0x000000001050B000-memory.dmp

    Filesize

    44KB

  • memory/8-17-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-16-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/8-27-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-37-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-48-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-58-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-68-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB

  • memory/8-78-0x0000000011000000-0x000000001104D000-memory.dmp

    Filesize

    308KB