Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 03:04
Behavioral task
behavioral1
Sample
b0eb18bd90be05684043cfc49baf6310N.exe
Resource
win7-20240708-en
General
-
Target
b0eb18bd90be05684043cfc49baf6310N.exe
-
Size
83KB
-
MD5
b0eb18bd90be05684043cfc49baf6310
-
SHA1
a492bc39aa0689dc07ec888ff97b62d352b34668
-
SHA256
a5a0e4fe5790b0bb315e476c552a0437fc03ccd810424f7c93a8c5a6088919cb
-
SHA512
17bfa14033bc0a0cd6339d2da2fb00bf05590a6e31ec27f8abb412cacf0a7e2a5f5eafa67a9f9af397a81934cb43338db1ae2632cf35eafc28e9952bc64f25fb
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iK:LJ0TAz6Mte4A+aaZx8EnCGVui
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5040-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002343e-12.dat upx behavioral2/memory/5040-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0eb18bd90be05684043cfc49baf6310N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50316172aac7497d4c25889dd14ed5aea
SHA18db3e3e35d889eb3ddc514cbed251b1e0517856b
SHA256f18aa74ed4f289d7df45e7ac5dbab19cc361c34a2314b2da5124c46aa2167d1c
SHA512c2e8247f37adc89b80a9c6cea247a85031197940933d2c8febf1093c3776ce0c838763f67e9129255eea68513c92152264ce1ca85d852df50ce0fce25cdb152e