Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250425-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250425-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    19/05/2025, 17:31

General

  • Target

    ku3qqiqo13kgw1.exe

  • Size

    13KB

  • MD5

    73654c88ec4c3d3e30153e93a5b18dcb

  • SHA1

    e93ff1ef0dbd9658805f61ead19a53da124a5b11

  • SHA256

    0e56c159b8c4fe60ee4a9d9bac1118c9467965086d1de239e1b27ecbbe540182

  • SHA512

    09822318773f20260c37b02c2ed59a8ecf6563e1aacda00d2f37ee4135f87cf738fdd394c01aefa031a47ec58d3d5515a27d0b44261217971919cb129ede91a3

  • SSDEEP

    192:C2WjQTbZ1eBppvfj/j2+cPM3P+Q/tCvwSw3uM76V9bhHOkrUN+f:C2jTbZ0pj/vcqP+ctCYSw3GV9bhrUN+

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe
    "C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1980
  • C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe
    "C:\Users\Admin\AppData\Local\Temp\ku3qqiqo13kgw1.exe" start
    1⤵
      PID:1308

    Network

          MITRE ATT&CK Enterprise v16

          Replay Monitor

          Loading Replay Monitor...

          Downloads