Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:20
Behavioral task
behavioral1
Sample
282a13a615f0ad317fb4508750e2b85aba636f76f06ad9b1eecf41acbc0e2d74N.exe
Resource
win7-20240903-en
General
-
Target
282a13a615f0ad317fb4508750e2b85aba636f76f06ad9b1eecf41acbc0e2d74N.exe
-
Size
83KB
-
MD5
1981d448b9ce152f62e3ab3fdd00e000
-
SHA1
88913bdceb1b1bce0db5ac8906e0aa3402de542a
-
SHA256
282a13a615f0ad317fb4508750e2b85aba636f76f06ad9b1eecf41acbc0e2d74
-
SHA512
e25bb14003022068d97fc48f5962238947a71ed296efde1152bdf654e3e186111ad30e093bdbea0f0e45abfc9ae7140c38c1c91a8396645dd7805a99c29fdcaa
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1844-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1844-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1844-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1844-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234c2-12.dat upx behavioral2/memory/1844-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1844-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 282a13a615f0ad317fb4508750e2b85aba636f76f06ad9b1eecf41acbc0e2d74N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a621d8aa338cfc5be9e1f057fcda6985
SHA1f60293887a3567076df94da197078945d9d2f4eb
SHA25685db37c9065b53a26166a0f188710a592cb298ab92f53a766ee33251590db883
SHA5127fd632570d8dc75ad9c045f404530da2557066eb921d819afff5d7ba51a5001abb38da7fa5395f6056804dbe2442e6b22c71f873f0df80e7a2373d1d64854611