Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:02
Behavioral task
behavioral1
Sample
35f6f0264c21acf607ffcee7c2be6e9e4134295ea8a9faf40e4d146b01011336N.exe
Resource
win7-20240903-en
General
-
Target
35f6f0264c21acf607ffcee7c2be6e9e4134295ea8a9faf40e4d146b01011336N.exe
-
Size
83KB
-
MD5
ccd00aac009201d664f259351064ed60
-
SHA1
f9185727aa09cc8881689bf81e2b9be04ccc5e5c
-
SHA256
35f6f0264c21acf607ffcee7c2be6e9e4134295ea8a9faf40e4d146b01011336
-
SHA512
9b9899f1b772daa0d8aaa15d774d527bb8146cecd4ba925f20a158ab5641456ea2f00dd0172caaffad955d8f51be8423352b40472d14e6459f436145b1b04173
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3868-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3868-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3868-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3868-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0011000000020196-12.dat upx behavioral2/memory/3868-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3868-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35f6f0264c21acf607ffcee7c2be6e9e4134295ea8a9faf40e4d146b01011336N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f6f0264c21acf607ffcee7c2be6e9e4134295ea8a9faf40e4d146b01011336N.exe"C:\Users\Admin\AppData\Local\Temp\35f6f0264c21acf607ffcee7c2be6e9e4134295ea8a9faf40e4d146b01011336N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1020,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:81⤵PID:3924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59a1333a9f913dedf511e17ef289b8ee1
SHA18a89c5e2385cfeaa24315838f503ea3eeb036b1b
SHA2567c8251e862a0c2f5acd929fe63379657e95ed95bbb0e8639acebb56fcb98fa80
SHA5128e938f3f983bd1c58727f915c64a3b6b759201658e526398f535e78262ec556fee6f0c35b4ec7048221d3bc2b1fbffab4b3425af50b27a50e19d87d4960adbac