Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:53
Behavioral task
behavioral1
Sample
8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16N.exe
Resource
win7-20240729-en
General
-
Target
8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16N.exe
-
Size
83KB
-
MD5
a8be3c77554666be8a01a7d8b3cb9530
-
SHA1
5b5da30b2311046c644d02267bc5f477639c1206
-
SHA256
8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16
-
SHA512
dca15e383fc1a81ea686b9cd06d8a822646a4ccd14f9632bce019b4e83752f20478496b9989536f902a615f1f28dff36abde22147d5ebb7dc5030c26c246de03
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4132-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e0-11.dat upx behavioral2/memory/4132-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cfee3214ba411ffc1005645c9714aedecb14457c2da62a8cb90a22b91618d16N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59c9e7984effec366ff77ed2a497fb42d
SHA1ffa6a84eaa7bd5f98fbc193604850cc01b21a5d8
SHA256d33fa6c51728508b470e5e8369f1f4a90d9866803df6f54ff84c3d5344d86106
SHA5123437b6b1d4c6915ff5476b10f40a97ca676c1a3250a3fc595d0e6fb321ff0fdd418bd65f26700d9fb7be6d2eee4c246f9b6d5a3930888636aced30c3107fcc3c