Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:12
Behavioral task
behavioral1
Sample
53f7c39f5c0b773d459fbe43d45c9cd7f31e530a93eb1b226909f5fbd58e139fN.exe
Resource
win7-20240708-en
General
-
Target
53f7c39f5c0b773d459fbe43d45c9cd7f31e530a93eb1b226909f5fbd58e139fN.exe
-
Size
83KB
-
MD5
f4f301ebc0ac6b0cdb586adb0805f070
-
SHA1
7de49e40816f0820797125920f7cf4d97ef64806
-
SHA256
53f7c39f5c0b773d459fbe43d45c9cd7f31e530a93eb1b226909f5fbd58e139f
-
SHA512
ece66d8cf2a4368244fab61688a52ef8527981e4c2f61d31e36778cb59111e69649f23113350ba90a0682d891fb1deca954302705b344a1838f56891d5e6afeb
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2084-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2084-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2084-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2084-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2084-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023469-12.dat upx behavioral2/memory/2084-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2084-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53f7c39f5c0b773d459fbe43d45c9cd7f31e530a93eb1b226909f5fbd58e139fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bb70f5efe2ebda3626985d6ce981647a
SHA10e98d2b26eada64b157bfceb8d12722538c63da0
SHA2567be485d20b1d229d6d0507487a41c666fa198b259e2e6d752a74e90083241fc7
SHA5126d8edbadda2f30ed3ac18b1a6a4c1188ab9b8c68b95e10fcf5f5934ee251e99ff30d71aeb35fb7a8c5c32faf308d8f0a309bd4736da1bda7814c91696d4d6926