Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 03:37
Behavioral task
behavioral1
Sample
4c21ba1e8c62bf5ffe98ee70c1fb8720N.exe
Resource
win7-20240708-en
General
-
Target
4c21ba1e8c62bf5ffe98ee70c1fb8720N.exe
-
Size
122KB
-
MD5
4c21ba1e8c62bf5ffe98ee70c1fb8720
-
SHA1
6b920add0ddef1ba371aff6492bab1a7263910dc
-
SHA256
3084e6bcff178f28abda5faf9b38b18f35bd2979e10f3cd7d898eefa6c2cfd5f
-
SHA512
4b30d94a1642e084d37f0c7ac7bd7b4d68a6e53588232e54a6e251cc000b3df9034d4d9ed10f4265c0c852d3b10ceba7e81c48bd032c5a59dcb797d238a88725
-
SSDEEP
1536:OcbqyEk65QiMa2Zi2tSVG4FnjJdLl19/Gb6XBMC4Hte74CA:hLSQilNIHujLl19/Gb6XBMBe74CA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2824-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/files/0x000700000002342c-5.dat upx behavioral2/memory/2824-102-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe 4c21ba1e8c62bf5ffe98ee70c1fb8720N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c21ba1e8c62bf5ffe98ee70c1fb8720N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD54c21ba1e8c62bf5ffe98ee70c1fb8720
SHA16b920add0ddef1ba371aff6492bab1a7263910dc
SHA2563084e6bcff178f28abda5faf9b38b18f35bd2979e10f3cd7d898eefa6c2cfd5f
SHA5124b30d94a1642e084d37f0c7ac7bd7b4d68a6e53588232e54a6e251cc000b3df9034d4d9ed10f4265c0c852d3b10ceba7e81c48bd032c5a59dcb797d238a88725