Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:14
Behavioral task
behavioral1
Sample
398da0527af8ce869aeebb9cdd67013185aa22181acc41d560543f7eb0bc6245N.exe
Resource
win7-20240903-en
General
-
Target
398da0527af8ce869aeebb9cdd67013185aa22181acc41d560543f7eb0bc6245N.exe
-
Size
83KB
-
MD5
239f95c97a260d1f68104f13db74cf90
-
SHA1
c8a46cc66e3cda7fea67d7fcab314d41eb6a93d2
-
SHA256
398da0527af8ce869aeebb9cdd67013185aa22181acc41d560543f7eb0bc6245
-
SHA512
86def48cda7cfa9d93de659a62a402adae60c34d950da57b579a33464f0fd57242ca18e0bccaa51ecd96835fa70f451c74d77c8d161e557c264437ddabfd3adc
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3612-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023490-11.dat upx behavioral2/memory/3612-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 398da0527af8ce869aeebb9cdd67013185aa22181acc41d560543f7eb0bc6245N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a7b5d9e29c999bfb19e83962c66d0b33
SHA156f2900078815ca9402718a10ec5646756801d64
SHA256aeb6062c5f425058383b44327416f7f9ecffac7199ee78c2e4670ed44bb430a0
SHA512aee243d09b5d5293ae402c2f819ef2725a24325db50c20a60b72734843016353030dbb9f848823e0ce0f53b1b08cdc9481c0f0a87cb469a29b949b32d7ccd833