Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:55
Behavioral task
behavioral1
Sample
6718bc587c4cef4614204c27d2c1b718ea1ac52e1d161bdba3c4d7fbddb712b8N.exe
Resource
win7-20240708-en
General
-
Target
6718bc587c4cef4614204c27d2c1b718ea1ac52e1d161bdba3c4d7fbddb712b8N.exe
-
Size
83KB
-
MD5
172f5eb5171e75bee257159a9406e8b0
-
SHA1
5921ee4cd79b0ab432ef1ff6eb7c4e496d0d1c4c
-
SHA256
6718bc587c4cef4614204c27d2c1b718ea1ac52e1d161bdba3c4d7fbddb712b8
-
SHA512
29d3d111b2f0783223b3b22c908ab43913691d216613334029737eb3367b751daeab4099af6c9d5a5c647719108cbcd3e3f72dedadfcc9b8ba41e5ed2abf00ba
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+1K:LJ0TAz6Mte4A+aaZx8EnCGVu1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4024-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023459-12.dat upx behavioral2/memory/4024-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6718bc587c4cef4614204c27d2c1b718ea1ac52e1d161bdba3c4d7fbddb712b8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57d3f595d8396410a8467f2131d7588ba
SHA10b22a4d9c49c998e5841e492ef8bddac0968cfb7
SHA256262aa33283c2f1aafe1936c1cee5a4f0580744f088d142c17ed428a020bbdfcb
SHA512ce83ae043f9d8434be57dc3a4f080b16d04a85abfce90c2a71bcbe6f18bbbf0ff25591e3aa7ca6c5b58c456cc0a546d6697ac93e1b53d896815f6cf49db44a51