Analysis
-
max time kernel
111s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 15:59
Behavioral task
behavioral1
Sample
df939f318d72b92f63aa05be21af2c50N.exe
Resource
win7-20240705-en
General
-
Target
df939f318d72b92f63aa05be21af2c50N.exe
-
Size
83KB
-
MD5
df939f318d72b92f63aa05be21af2c50
-
SHA1
828c57e695de5469d7b3c53911abd9c9b5cf1a25
-
SHA256
0b34fe080cc2da21ddee2fc7e44c68b6bb87ce9e77abf2baa7526e15e13b3de0
-
SHA512
664b4790afe0ec8b7c4c66b0f6ff7f71b202e25b6cbad0362feb6dea6bf86f1388c75387cd74907d2474422f8faef89c3f746a669d119a0fd9f6c635e8d6c149
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+4K:LJ0TAz6Mte4A+aaZx8EnCGVu4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4604-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000d00000002338b-11.dat upx behavioral2/memory/4604-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df939f318d72b92f63aa05be21af2c50N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cf06c68749d86d323f928d4720ef2105
SHA1ce4243ea0a07f2f2e1bff0ccbf5c029b21a38fd6
SHA2567993a5e88c842551f8bff35ae01f51d962641a8d61d2b9f2253db1ef74ec6c2b
SHA5123724413a1b55c2939cf34fe880ddeaf8946376ed7234ed9a38596afce150f808e5e4a18fd03c241c3747bc62a3467e3cfe44ae9cfb90949f297eb200d742299a