Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 12:24
Behavioral task
behavioral1
Sample
3e1b6c7276c0b28f7cc03b37f298f000N.exe
Resource
win7-20240704-en
General
-
Target
3e1b6c7276c0b28f7cc03b37f298f000N.exe
-
Size
236KB
-
MD5
3e1b6c7276c0b28f7cc03b37f298f000
-
SHA1
f633aa3111068f1ac637c40da084880d9323c25e
-
SHA256
4ed4605cc1b4784ae9beb1bbd04a2f654825c17d7103b0c393523ddf88b6b194
-
SHA512
e102cc6b6bfafe2fdb913ffa460f716806f2478f3c157427f4f19bad53bcb31e97867a3d4071448bf3039fb5c598bea3a4cb1d719e9dfd826bd9d9afa22e35b4
-
SSDEEP
3072:zJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/V/FnncroP9:1wDeM7iNEkgiOb31k1ECRJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2780-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2780-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000a000000023474-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e1b6c7276c0b28f7cc03b37f298f000N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5657396b9276a7fd9977d2d4f21c71a35
SHA109cd49cce05bdabf3291cbdf8478f1ae27f15d87
SHA256df7bb80d4566c951d9691f795f644671919342af5e5519f82137875f5f292798
SHA5121b141460d9eb609025ed123282b525d3da76d2efa28caffbcd3c17703c1c9e5a91a4635ed4625a25f57e48731b190d64e41f17f6f88ef47d41f097ed1bfd98ae