Analysis

  • max time kernel
    60s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 05:21

General

  • Target

    Files/1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1.exe

  • Size

    97KB

  • MD5

    86faa03faca5764b65096940604a1390

  • SHA1

    f0e183789ae06266195cbe11200e830c011388b4

  • SHA256

    1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1

  • SHA512

    8366618f8595456ec5a839994b5bf3f0d80345b18f63313a3d191124a2835f3b6ec3a4067503d0ffe14d8e6ad0209c1eb597e6f753c0a82263b3edf9214f56ab

  • SSDEEP

    1536:j7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfVwWq8X4NoOj:/7DhdC6kzWypvaQ0FxyNTBfVnq8y

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Files\1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1.exe
    "C:\Users\Admin\AppData\Local\Temp\Files\1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\9366.tmp\9367.tmp\9368.bat C:\Users\Admin\AppData\Local\Temp\Files\1fb08d6dc54e057419e21ca6c5aa959c2f9833eebd6e8998843a737c009de5c1.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\9366.tmp\9367.tmp\9368.bat

      Filesize

      6KB

      MD5

      02912d322be9308c8bd4336f3015a8e7

      SHA1

      f22c8b00795e12b76a3e2daa27cd9c5900dae8a6

      SHA256

      1a4f1461fbaca250dda3194e038258ade2388fc037d4c27bc69860e902069dc7

      SHA512

      8090c1a67936f29a0c0b547cc41661a667c99886d8e9d2e19e9403ec939677ca79b20d21027752eddf98d70396cc7ccfaffca5e2af263d34af2030f8281213ff