Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 22:38
Behavioral task
behavioral1
Sample
11c2bac562c08c6e99ec88ecf518eb70N.exe
Resource
win7-20240729-en
General
-
Target
11c2bac562c08c6e99ec88ecf518eb70N.exe
-
Size
236KB
-
MD5
11c2bac562c08c6e99ec88ecf518eb70
-
SHA1
54d24519972f0d9dded6d283470bd5f484535bdb
-
SHA256
2fc48d80e4bba1c2b679eee21735eaa3b24d404f32f814017e85e04c0cada2e4
-
SHA512
bea462d361a654482712132da235785b76c63411082787cdad6922784b60631255b73204b88b32e208f3376903d968e29ad4e35535b5cbbe7a6ce6e138170d3d
-
SSDEEP
3072:FJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/J/FnncroP9:PwDeM7iNEkgiOb31k1ECFJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5004-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/5004-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000b00000002339a-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11c2bac562c08c6e99ec88ecf518eb70N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5502e08360fbca8b3f0fadc4f2825bba7
SHA1a01eca3352571405cd91783c316958002aad1b91
SHA2567492ea95269f1a1e01d2c0e294d4283b38a61391f74d92c4141f89ee8ac43398
SHA512e0de2370d1973d5af25c410166da3b54523805ad6d5f71b9faf896cb50700cdcce6212cfe65c23ede6c16dd2620ecb648964055dab38c47631b9b181770ff918