Analysis
-
max time kernel
110s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 11:44
Behavioral task
behavioral1
Sample
039352c4806acad9cb2bf457724f79b0N.exe
Resource
win7-20240708-en
General
-
Target
039352c4806acad9cb2bf457724f79b0N.exe
-
Size
83KB
-
MD5
039352c4806acad9cb2bf457724f79b0
-
SHA1
43af3c354a9a71bd0a7afb639fbd4f1592f78122
-
SHA256
26541efa5139206d6726d48118c60104179d0421982450e01d761df81a60a727
-
SHA512
51af416addde78bddbbbfb529073d0aa3dae7d43114711d62d04b6097eaddbf52acba3f7d7e3c631cc1532c7fd8714efb4e6bfc611ed67c91e9de205bf1498fe
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hK:LJ0TAz6Mte4A+aaZx8EnCGVuh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4360-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4360-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4360-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234c8-11.dat upx behavioral2/memory/4360-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4360-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 039352c4806acad9cb2bf457724f79b0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cd81e53258c2639599a29a9861f49cff
SHA114bc442d8296cc3e85b2faf2c1df30d60835d788
SHA256404fd9d72af917c1d10ac9114eada9eb59f9bdad48acee234205243dfb340569
SHA512dcc5c0c38431f874392184eabb2beb202c9a7c2f3555a08e8e7f1672baa2526116f11044afda41d293d7ab630ca06a6b84a8fef5ad45edfff55afcb0be1c6c6c