Analysis
-
max time kernel
110s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 23:30
Behavioral task
behavioral1
Sample
23e334adc396c466dd36cef522b5ad00N.exe
Resource
win7-20240704-en
General
-
Target
23e334adc396c466dd36cef522b5ad00N.exe
-
Size
83KB
-
MD5
23e334adc396c466dd36cef522b5ad00
-
SHA1
7a0e5399cd413f0ae31c59f0f89a11ece73517f8
-
SHA256
22cea687b78a02b645e7bf9a1284c87835ee54f2454dfdfe73c0a0faf5b6bf64
-
SHA512
6e4cf9767fdcbae290b1ca6f4b048ae6bef5654cdd49bea31b6bc026f3b89528f6e740d5df0981a294acc43341e7bfa5cf172858f8085437b1f2dac92d3ff978
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+1K:LJ0TAz6Mte4A+aaZx8EnCGVu1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4940-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000300000001e745-11.dat upx behavioral2/memory/4940-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23e334adc396c466dd36cef522b5ad00N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58c92ee10c62ee1986cac65bcda53bf38
SHA15a1b2a666a4e984b15b5a211a9288068c3b0bd14
SHA256e527b2dc9cbd8e14b9f89b6bd708b997a9fab242c33a335a22401e88ebe8b417
SHA512f1a48e7953e840845c2ad6aee320e8a64a49af0d99d9bd606481b61bd20cbae6cf814927fb529612f4477edbea8522b5ebc303c3826c04cd7358f3517a00b9f2