Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 09:27
Behavioral task
behavioral1
Sample
f8b5b1f753911ff962eca6a8c5c0c880N.exe
Resource
win7-20240903-en
General
-
Target
f8b5b1f753911ff962eca6a8c5c0c880N.exe
-
Size
236KB
-
MD5
f8b5b1f753911ff962eca6a8c5c0c880
-
SHA1
454db94619adafb39618361ae6296e63951dae59
-
SHA256
fd06268beac767a49b6a92fefa5ca30127297ca1a0031431010166c8a60296bc
-
SHA512
36c9e1edfac623928ba66cd50cff41951c5a255936df211603405fbbeb95c01c53455186b9d902381b5f761f78b379d5b0bb23380cc1a3c033c6eb85f3e64a9c
-
SSDEEP
3072:eJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/s/FnncroP9:iwDeM7iNEkgiOb31k1ECKJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2372-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2372-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x00080000000234e8-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8b5b1f753911ff962eca6a8c5c0c880N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5d1365af88ec988e9d42826c865f9edae
SHA137acb6db88335f12a0c72ea231ea046aa91bbd66
SHA256792a28d212419630240640f1609699a3fd994371a80bc703263da584ffd6a866
SHA51228900fb96295262852c83898ba707e1ae0eb866c0f8251a5c6eff766f25830b6a0e5f882dd91867408187402fbc361b76d6d0c9f243cde3d1b6a81e42c8da998