Analysis

  • max time kernel
    104s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2025, 09:41

General

  • Target

    3184-24-0x0000000000400000-0x000000000042F000-memory.exe

  • Size

    188KB

  • MD5

    57f385f06ef1ebe16da3ccc1179ec207

  • SHA1

    b1778ad79734b9da8224ec9d71e34e1268d3ca35

  • SHA256

    7092a1b45b54906b89605c6b7ba05a7220f8f68d6bc0b0227cfe85c70753d8e9

  • SHA512

    ee531aa20df911470ec8f048ad79ce49fa8d2a47884b67c23b74485a383ba668cc3dcaf4c9d9b7b60c042985f26e2f7976e0adc46ab01b8eb3ca9ccbdc8c7bc5

  • SSDEEP

    3072:A/XHSFrgvyRJ9Q0WzurZWol/1pfPIgYsjvX5mJhhmZ3Ludewd2jXHIyl/h:8/vRhur0ypfPI5slmodLu0NXo+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3184-24-0x0000000000400000-0x000000000042F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3184-24-0x0000000000400000-0x000000000042F000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:5920

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5920-0-0x0000000001920000-0x0000000001C6A000-memory.dmp

    Filesize

    3.3MB