Analysis
-
max time kernel
111s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 02:22
Behavioral task
behavioral1
Sample
d53650bdb947f6935ee49207126e6c80N.exe
Resource
win7-20240704-en
General
-
Target
d53650bdb947f6935ee49207126e6c80N.exe
-
Size
83KB
-
MD5
d53650bdb947f6935ee49207126e6c80
-
SHA1
e7f4a37ca69ed4a50c94862fa003f8fe15433212
-
SHA256
381510521e721941898d35e53f4577634be2b1211d4804456a6919f803988e2d
-
SHA512
3a73c5185eca063c6015bb0586db34be81de94ead03419aac8c840608b00b0dd0f7250c34ffa43a404102d6c6444ae319ba64f584e40cd7f1afce00253ee1009
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4928-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000300000001e746-12.dat upx behavioral2/memory/4928-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d53650bdb947f6935ee49207126e6c80N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5fa86c0050cb5f7d78e6ca7e2e94c207b
SHA1ba80e44354a3c7c525971efe4c27bd73bf944a94
SHA2565aaf49257485f93bcd59e78b34aa7005e72891a6e3d4ab99d93fb67eaa156a18
SHA5123b7988786528ffe12d0f8c83e105fed06614a546c3c946f06622a351854554c33ac61043b02ac34f46707367c0287d09df2f469b5a7487c25b2ef8a1be8a682d