Analysis

  • max time kernel
    103s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    e8686658e2163a23de75fe75807e0d12.exe

  • Size

    2.4MB

  • MD5

    e8686658e2163a23de75fe75807e0d12

  • SHA1

    13b967640328c617d05ddb7dc2e81f6c42b87a8c

  • SHA256

    fc8ad2197b7f953a85e6333561efa2d83249e7926ece6d2e4dd4d5eedba3f4fc

  • SHA512

    f318ca4f413301aceacfbd9f0fc3a6c2120df88a48fd545c14253ae534a782c2a0b1062bac5025f13c7a8d4b9965945574b7d606b4385b94e991cd9e75d9d4e6

  • SSDEEP

    49152:6vFIuOCJ2YfXjBfAYYqY0vI6DOTwv1X8Sdh6KqQRc5L5B:ScmTVAYYqQ6DOTwNsSdh6Kfc5L5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8686658e2163a23de75fe75807e0d12.exe
    "C:\Users\Admin\AppData\Local\Temp\e8686658e2163a23de75fe75807e0d12.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:5160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tmp78CA.tmp

    Filesize

    2KB

    MD5

    d453e6a7588cf41c5632850e33bdd294

    SHA1

    421a9bf02f71d2f53365739233eb9a13bc1b0ec8

    SHA256

    f72d28c21652b0657e5ef6dbce0b5dd0b50ee7d0c966a73f54bcdaa418a971a2

    SHA512

    15a0c2073469c75200a6b845cfcb45cde457129f6bda77b5b2b8707023ea89552c4058cae2493aea17d65ff28b25dbcdc6e3fda0b1230492fd446aac3539b861

  • C:\temp\122a0440-ae8c-4333-8332-954348f83057

    Filesize

    3B

    MD5

    b3e3e393c77e35a4a3f3cbd1e429b5dc

    SHA1

    a6f16ab483da9847d431a822e6c85e144dc54f30

    SHA256

    620c9c332101a5bae955c66ae72268fbcd3972766179522c8deede6a249addb7

    SHA512

    36216009d61176703fc0416baadbdf3c42f91e283f06925fdf11a08edcbdb23f29e879c02cd26d3b1ecbd6dd1b43eb39d7d28a049e989eb1b8fd21a1a1fcb488

  • memory/5160-3-0x0000000005650000-0x00000000056A0000-memory.dmp

    Filesize

    320KB

  • memory/5160-0-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

    Filesize

    4KB

  • memory/5160-4-0x0000000008530000-0x0000000008AD4000-memory.dmp

    Filesize

    5.6MB

  • memory/5160-5-0x0000000008030000-0x00000000080C2000-memory.dmp

    Filesize

    584KB

  • memory/5160-6-0x0000000074D60000-0x0000000075510000-memory.dmp

    Filesize

    7.7MB

  • memory/5160-7-0x0000000002EF0000-0x0000000002EFA000-memory.dmp

    Filesize

    40KB

  • memory/5160-8-0x00000000095E0000-0x0000000009646000-memory.dmp

    Filesize

    408KB

  • memory/5160-2-0x0000000007A40000-0x0000000007F84000-memory.dmp

    Filesize

    5.3MB

  • memory/5160-49-0x0000000074D60000-0x0000000075510000-memory.dmp

    Filesize

    7.7MB

  • memory/5160-1-0x0000000000910000-0x0000000000B84000-memory.dmp

    Filesize

    2.5MB

  • memory/5160-83-0x0000000074D6E000-0x0000000074D6F000-memory.dmp

    Filesize

    4KB

  • memory/5160-84-0x0000000074D60000-0x0000000075510000-memory.dmp

    Filesize

    7.7MB