Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:20
Behavioral task
behavioral1
Sample
9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe
Resource
win7-20240708-en
General
-
Target
9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe
-
Size
83KB
-
MD5
93b6d72b3c47638f4d62ea0b3b9f1900
-
SHA1
3e441b5beb35c9a006ad25236e73d4ad4a065702
-
SHA256
9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8
-
SHA512
c7ca29e3c77b10b1fee98c4a5f83a38f40b7186de7f65bc3e995a6b1695b311af82129d071e79a73af4dc7be9d74b07b9a2e34b0d1f7a759d38179bafcbac574
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK:LJ0TAz6Mte4A+aaZx8EnCGVuU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2032-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2032-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2032-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000235b0-12.dat upx behavioral2/memory/2032-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2032-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe"C:\Users\Admin\AppData\Local\Temp\9aae5f69841bf9893f5c16969162f94e6ae0cef377b51f9994753ea393e6a3a8N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=1436 /prefetch:81⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD548b82097d44dd05befbb0259d535ee42
SHA128391ff658ac3d9d2bc0bfafdc2050cf6c33a01c
SHA2564f8ed4cf274b873a0dd3a2027cbe3582fc5e9b9dfbb51ed70b67388f1fda7ddc
SHA512f944bd537637fa8eb46bc96d021cd86def91120117805361c5c3941013ee7c489406c59ea54b5ea0f48416796055c8d6f5a4defe240f8ee0ffc97577cfd65d4b