Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 04:02
Behavioral task
behavioral1
Sample
e8e0044f621b8e43b7bcbc100f212f6aec8aaa061aa9c8ec807d1616d36aabc3.exe
Resource
win7-20240704-en
General
-
Target
e8e0044f621b8e43b7bcbc100f212f6aec8aaa061aa9c8ec807d1616d36aabc3.exe
-
Size
83KB
-
MD5
973c965f5715a0996dd0c364c69a76da
-
SHA1
ab4a38753e029a2755bd2707c5ef519be69ef87d
-
SHA256
e8e0044f621b8e43b7bcbc100f212f6aec8aaa061aa9c8ec807d1616d36aabc3
-
SHA512
c1db490ad11bd2af6d98bb512f1632540e19d7b1598d78fe33eecbd44f4922e94bc3375f96a89106478e8d126c6f29b397cb27d4459a5ce3908f43fffba5e2cd
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YK:LJ0TAz6Mte4A+aaZx8EnCGVuY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4784-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b00000002342a-11.dat upx behavioral2/memory/4784-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-28-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8e0044f621b8e43b7bcbc100f212f6aec8aaa061aa9c8ec807d1616d36aabc3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56945197c9c6dc2a4a342a7948ef972a7
SHA187fb7596b54c39e120e00d9f9ddc6f16a8e9160c
SHA2567d2d2ea254e0c470702eed3109fb7f158929b286b7cc7e1c1ba65000b103a31f
SHA512c1fd39ca9c5290acc3cd25342a329643007fbbb1da5e31e9dc1c502cb676c6979c6570aac0e837d4fc8c61de1a401214379b2ce9f66b011d4a39955f720614cd