Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:34
Behavioral task
behavioral1
Sample
5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625N.exe
Resource
win7-20240704-en
General
-
Target
5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625N.exe
-
Size
83KB
-
MD5
d836c485c498341566e49ceb683c5f80
-
SHA1
8578b9eda82eb74cce21c1e1a5c6227d3e445645
-
SHA256
5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625
-
SHA512
fa47365222dd029797634d996f12ea38af8fb2fc0e0076f6e57e7417a562b39775604f8e96c561facd161125298ccc43ab016f0dd27452f21cfe86cc4c116b18
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4932-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4932-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4932-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4932-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234cb-11.dat upx behavioral2/memory/4932-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4932-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD51832a73949a0d368fe78883a41ca7d66
SHA12bcecb6f66267e7bbf000854537122886e4cdfae
SHA2566d10f196cc45f0781d37dfa096c54e917786e714be32ad4d4ace2e023cb0c49e
SHA5127bd907396e68aeacc42d45d925d443615362d72407a2b5fd50bb6024d6f47180ae29ae274dc70103b2d9cb14088868ba6d1b3d4d1314efe7cccc90ef1b267ce2