Analysis
-
max time kernel
111s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 05:01
Behavioral task
behavioral1
Sample
373a43deb99606c0b7b8238355e00640N.exe
Resource
win7-20240705-en
General
-
Target
373a43deb99606c0b7b8238355e00640N.exe
-
Size
83KB
-
MD5
373a43deb99606c0b7b8238355e00640
-
SHA1
366c22e39fb6b5c10b6f0518fe232b479b5679c9
-
SHA256
8e08f2206e2375916977e64e593ce46fc2beb155ad71c7b54deb7064324d8b4c
-
SHA512
8da5f7135c6f5e5b217e8fb44b1244485fd833ba0f6c7188bbe0a907b976eeedc9ffec81b307522c5fc2321a5e5f79ec66fc967030334659918335ffbca15c3a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+FK:LJ0TAz6Mte4A+aaZx8EnCGVuF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3276-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3276-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3276-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000400000001693b-11.dat upx behavioral2/memory/3276-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3276-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 373a43deb99606c0b7b8238355e00640N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD570561a4e48fd3d1ea22f7e48a42f47ed
SHA1318f6b5f0f3a451fc40e92e86106f62e3b94eb0a
SHA256b5da06f3b512fc75a18cfaa020186e9ee6074b24847b8b35fea4168f47d1fa24
SHA5129776709d6141f2657750e3cec87ac516bf2ab6ce0d11d6f1471c4a7c924d59b56763884eba820b969abcac7a7b290b35d4a99ac503789ac7ac006bb38ac85f5c