Analysis
-
max time kernel
111s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:52
Behavioral task
behavioral1
Sample
33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298N.exe
Resource
win7-20240903-en
General
-
Target
33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298N.exe
-
Size
83KB
-
MD5
2da30220af5eac6f9ddfe502b0fe7660
-
SHA1
df192b41909e998b6195f582491ecb9d7dfc67ff
-
SHA256
33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298
-
SHA512
091ddb98e1ad8627d533ec7a6d620b7803cf8712ba8c9ae6d8eaa803a6edb7b06067797561aa1a11797020b3b7be510488297d606b10d13a1ecb7a17d96d0df7
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2132-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x001100000001e0f2-12.dat upx behavioral2/memory/2132-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2132-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33256e7d6bb4779c66c8480e0e5d7eea15200a6b8ff330da1d2511290750f298N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD507a8fe31d129d79ae6e77d8c30dce443
SHA1d8d75787c496cf249a04f4fd2367c059269c286e
SHA256f4e621e3961e30cd1b6aa638f35673be835ee9a7d2228c57eff32660784b46f3
SHA512e742684d61ec3ec150ee14274645f188c09080e7758d6da2c772b3f7024a2f9ef1413b5ad160e999e7feef72541ffe08f20c3db95f9e3b2120d72a1e613b931a