Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:26
Behavioral task
behavioral1
Sample
8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7N.exe
Resource
win7-20240903-en
General
-
Target
8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7N.exe
-
Size
83KB
-
MD5
19712214b49abd67960f78251944a630
-
SHA1
58eff35bea2e98eb177a8e9408867c2c79e607c2
-
SHA256
8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7
-
SHA512
4346eceffa6d6348c5391b8d1235cf59ccc34b6dfc8d2a2e8266405f486850ce548244d8ec67a913649727033c023c2bad1f412e82b7de33379531ce3287cf80
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3768-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3768-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3768-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3768-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234dc-11.dat upx behavioral2/memory/3768-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3768-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8faa2cf2664cb74b4043e046df3193cdf9b56d9c2ce76d08c2b7b690179663d7N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56128dfc1280dd3cdcfda423bfcd8a821
SHA12dc3f3694c63fcadcf22065ebdc15b394003f3ac
SHA25622a92ae142bc32f320be0d5b73e7931fb0fbc14d74a3e7cdb9ab11769f73ecc4
SHA512a5dabcdc03a6882b4d671ec60d08b7b48cfb2f061e8101287350613463bb2c326ab0dcf77fcd6876edc57c1f28aa81f421c16c7c015c35bd8e2788cdd4709745