Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:23
Behavioral task
behavioral1
Sample
c54c20922a037b943416978b559f73f0N.exe
Resource
win7-20240708-en
General
-
Target
c54c20922a037b943416978b559f73f0N.exe
-
Size
236KB
-
MD5
c54c20922a037b943416978b559f73f0
-
SHA1
0c65c5e7c240c2fe6690cd26345cc791b729321e
-
SHA256
b6a7ebe112fb7ddd7dc8c449a6be1ba87b38ec6be65fdd1bcae020eba202c252
-
SHA512
12014b733430d82029217229e13a67f39d5253e01988d4dfc976e9e5b682c5c9b023603c2e582df3d64a574f2a147ca4ccb55970ad4126b81a5462319df39261
-
SSDEEP
3072:7J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/d/FnncroP9:9wDeM7iNEkgiOb31k1ECJJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3360-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/3360-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000c00000001e554-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c54c20922a037b943416978b559f73f0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5bec33a54b970126c8a3289be9fdc137f
SHA10fc46c6e3f666c18cd50c4e8950f418dee5dd3fd
SHA2563fc6723dde2adc3962500a758a183651dc2e76500d77bc53fe4339b0d788ae5a
SHA51260027b51d6ca4d5f805536ff17731d4be294e171f3c2bda054d2df871ea695d38645827fdd5b5ddd1ef4c86cb668986ab7d2c90a3af8ee4ff6ba90b61a2145ad