Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:26
Behavioral task
behavioral1
Sample
44a25bd41f67c7049e9ba05b01c9bb3b18d4a543180f8010a29fb28dc39725f3N.exe
Resource
win7-20240708-en
General
-
Target
44a25bd41f67c7049e9ba05b01c9bb3b18d4a543180f8010a29fb28dc39725f3N.exe
-
Size
83KB
-
MD5
46468ed93fb4f403bbf8a5284b56b110
-
SHA1
747f49b0f406a66f3b95a957a52f05a673cc98e5
-
SHA256
44a25bd41f67c7049e9ba05b01c9bb3b18d4a543180f8010a29fb28dc39725f3
-
SHA512
784d55a8ceafbe956cc251de298f2b7082e396cdb776afb317def0c4fdc6328f826eb3628584f13514b3e97bbd4d87e8483e6e3cb2fc16461690385b7378cb8d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GK:LJ0TAz6Mte4A+aaZx8EnCGVuG
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2372-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234ef-12.dat upx behavioral2/memory/2372-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44a25bd41f67c7049e9ba05b01c9bb3b18d4a543180f8010a29fb28dc39725f3N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a48da017d788fb97fcf051703d5d6af6
SHA1ad71771aa5a44307a0f9db249cefd26d1409b466
SHA256d735a7eb6ddd5152017541d7dd6c48e754b82d3deb768cac6cd3b5fa6eca3c0b
SHA512a6019202b8c73e77b62037e7027fc00bfa2e8a3ce90af34bb0c4b78e3a732fcb06ad7e7fb7c0c41eaea423bacdbdafc363b2791adb7925a780c50229b2be293c