Analysis
-
max time kernel
111s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:32
Behavioral task
behavioral1
Sample
0c68cd3d8cc5576f2c70fe29ab66944d2f3915df291495a8782afdc1388a998eN.exe
Resource
win7-20240903-en
General
-
Target
0c68cd3d8cc5576f2c70fe29ab66944d2f3915df291495a8782afdc1388a998eN.exe
-
Size
83KB
-
MD5
b54dd87cebae810b7f614a7feb7c3d70
-
SHA1
972c09d01bd121f9c85fe6b4f33724268b199a0e
-
SHA256
0c68cd3d8cc5576f2c70fe29ab66944d2f3915df291495a8782afdc1388a998e
-
SHA512
e712ef162ee80a17585fa60ee0efde3187bea4c0802364701d39d178c8eee12d0163fc3a5492ad20cad65c633fe3f613ed10fc111a9a6a3d8d8a0e26fd22838b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2000-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2000-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2000-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2000-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234db-12.dat upx behavioral2/memory/2000-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2000-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c68cd3d8cc5576f2c70fe29ab66944d2f3915df291495a8782afdc1388a998eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58fbe5c2b21418687b6c5ec173afadbd3
SHA19586c714086d9e1448e8daabfc4b7bf84352a05b
SHA2561267a6393dc13f4a5854e29dad4e69d0b83d071b10a6591fc9de95774b8e488c
SHA512e561d46182f10c0e384357109222467a5d3ff46d3c03f916ee40c5d5718ecdf8dbd7a9370913a0c0c77211f2fa7be355992bdee280a5cc117bfe8038c12cd3fb