Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:48
Behavioral task
behavioral1
Sample
d46479afa539214cc3210743d6c36c8ff6b301a9f777722240987aa95f3b0baeN.exe
Resource
win7-20240729-en
General
-
Target
d46479afa539214cc3210743d6c36c8ff6b301a9f777722240987aa95f3b0baeN.exe
-
Size
83KB
-
MD5
8ed803d3236e51db4ed193fc17c127e0
-
SHA1
faa1ece1467a351231def1e37802801fdcf473b0
-
SHA256
d46479afa539214cc3210743d6c36c8ff6b301a9f777722240987aa95f3b0bae
-
SHA512
f58a4485077525f2279b662ef29c5c1f693e93e3cd009629d3e4c62fcc3677d112dcf5b964720ed0eec878731fe6843137f5c1c0e7c3f2cf4f4c24d5b44b9aaf
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4760-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4760-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4760-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4760-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e2-13.dat upx behavioral2/memory/4760-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4760-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d46479afa539214cc3210743d6c36c8ff6b301a9f777722240987aa95f3b0baeN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57b8172e800842b9c54bc29108a27a6a7
SHA17cf831f90de5be70dbdce583176e0871024d3c36
SHA256d18508b293abeeb9320d2f7a3edec7f4608d032eaee91d1811a11ea03aa2d85f
SHA5129024222af7c6a5519578154bc2a86c39f24ada57ccf01af0b7046dae9e41d9cc1c35983dd6dbd4298cb5d673e296d0f25ac651c7afe3fba4a6559044db48a961