Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 22:04
Behavioral task
behavioral1
Sample
c977214ea970d7c875fb5403180e3490N.exe
Resource
win7-20240903-en
General
-
Target
c977214ea970d7c875fb5403180e3490N.exe
-
Size
83KB
-
MD5
c977214ea970d7c875fb5403180e3490
-
SHA1
57db90ce5c5f53f42e723d43dd2ef4c5d2062216
-
SHA256
8a42e46fddbea8b4a340bb34a5c4c822eae1baced39c4a15aa2d507572d2887b
-
SHA512
6df3b07842ea00fc5f8de09796abbce02c224d63cda139b737d45237444ae0473d9c81c5f17f6dd4534f7b0183f9a226ecb17c466ff8043e3ee4a504d45fdce8
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1776-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1776-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1776-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1776-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234be-12.dat upx behavioral2/memory/1776-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1776-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c977214ea970d7c875fb5403180e3490N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD559ba544f4e22e5d5b6510eb5502405bb
SHA139a33338936980de909e4c347c2937e7e1d0446c
SHA25642042b07c146754789da5e6f0b8757442156b362e7589ea7ec590d0c2d635edb
SHA51262126f9356cf18cbe3f5d5bbd3b7768b7246ded269143b5ceb2434c4c467f7a5a7c4748c4bf7e6765d936e3888bfef91bc5d4a6ada12324c2f6cc480962a87f8