Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:05
Behavioral task
behavioral1
Sample
a0b4aeef189c4b4b97b9c6ed19e609255747913e45210fd5b9f9f3670187db63N.exe
Resource
win7-20240903-en
General
-
Target
a0b4aeef189c4b4b97b9c6ed19e609255747913e45210fd5b9f9f3670187db63N.exe
-
Size
83KB
-
MD5
cf633ef10a45777664a70ad7677f1750
-
SHA1
50f2ffe61736e415c1a4379b8151b4af7c99720e
-
SHA256
a0b4aeef189c4b4b97b9c6ed19e609255747913e45210fd5b9f9f3670187db63
-
SHA512
985bc665bc5d0f02e5caac2eca17ca749de52ff1c4c7ca448a41910d194c9b948a8a2898446491fb5ebc4fce35443dfc3676478cfbc4c24b8edbf74b67042352
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+SK:LJ0TAz6Mte4A+aaZx8EnCGVuS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4692-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023634-12.dat upx behavioral2/memory/4692-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0b4aeef189c4b4b97b9c6ed19e609255747913e45210fd5b9f9f3670187db63N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b4aeef189c4b4b97b9c6ed19e609255747913e45210fd5b9f9f3670187db63N.exe"C:\Users\Admin\AppData\Local\Temp\a0b4aeef189c4b4b97b9c6ed19e609255747913e45210fd5b9f9f3670187db63N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:81⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD585553aaf25269a0c3011825ce33d1ee9
SHA1c32160decae5fc25725876768c22be5f6692b6f3
SHA25631ec407b87288518ae54f92c4150972719f3bf5b97ce7361ea5e2dc58cc6cf61
SHA512de7fc507c6041ababf01068ca05907b41de4b821fe615e1a5c55cf3e765972c8a9abcc974e8b8d1b4a99cd2533ee2d0bff20aba6b718f894250312f605a37d33