Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:30
Behavioral task
behavioral1
Sample
0599852fa4e3fd7afd6f45ff81642dc0N.exe
Resource
win7-20240704-en
General
-
Target
0599852fa4e3fd7afd6f45ff81642dc0N.exe
-
Size
31KB
-
MD5
0599852fa4e3fd7afd6f45ff81642dc0
-
SHA1
aec600897e92cc2fda30d900da7131f81b41f7a6
-
SHA256
8fc29023c12fdf4ce65fe89a0aa17fc6f9069d3772442bb4d59081015b5035bd
-
SHA512
9a80364bdbf9d51125c32840e9db384ed89e5728f59b75e604146c2fcdd0614d4bbc2d0ec31ac5a98a9804d8c7711eab9194f45cef0952e0ab09a0e4cae68b9c
-
SSDEEP
768:ITRfpN0pOy3OzeXmOGXbJOlB2vsLCik5dAy7b6lS2d4xV:IHzzeWHXbJGB2EOik5h36lB4xV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/files/0x0007000000023431-5.dat upx behavioral2/memory/3700-101-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0599852fa4e3fd7afd6f45ff81642dc0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD55307a1440b745fa3f513967cb1e50df3
SHA1213431ea27558c2c9c84758fcf6f9df7350a8296
SHA256eca434966316fbf2e5df140408abd83d1a3c354d20c58d5915f2c03a642bda5f
SHA5129a94e3cd7798dffa6d2932614edac457444195e6e0c76662132b09c1d541ac4db677062ecf91d93089d54e611bfb5b2e902991e29558907bc0916e34da04c1be