Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:06
Behavioral task
behavioral1
Sample
a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7N.exe
Resource
win7-20240729-en
General
-
Target
a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7N.exe
-
Size
83KB
-
MD5
18b1758caa98d9b992ae56e3f57c30c0
-
SHA1
9bbe97103c93ba628ad65b42b6cefbdbae3e3ba6
-
SHA256
a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7
-
SHA512
77ec71560937e81da1f116b3254e73a8ff4cdc10c6e4f4b38f6c45f32cd3f793b3b2c91a4129979f8aee7e1c867ecc603b9efbbf93d6506e1421dedd3d7b356e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3096-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3096-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3096-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3096-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e7-11.dat upx behavioral2/memory/3096-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3096-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD54e38fe8a8b371ccaaeb4a5eab2d5afb8
SHA150c8da1bc0c0d7d8fce41e4bf802436deebcae9b
SHA2566f471bd07163643a8bc069520e1066297619b158b519f1acbf49b516ca9e8dec
SHA512bf0bb329e2102d37b2cb7db4f6c198d380346dacc3c7ed1a4b307821d5c64ef602f05d9f6a03cea6d6b8f641fa3945a053e57282afa38d89905e9f919f41a704