Analysis
-
max time kernel
111s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:52
Behavioral task
behavioral1
Sample
393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe
Resource
win7-20240729-en
General
-
Target
393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe
-
Size
83KB
-
MD5
62d1f379fb77a800578484347a722430
-
SHA1
172467b43bad73132d16af65de91161f6bf94b52
-
SHA256
393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41
-
SHA512
69b1708cf0c11fe9fc71b76c5796113faa114f24634d1ae4ca929d48eb316cdafab2f179959447f4a886eab484e7241118fedb2b04996476d7bc4234571a6106
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1884-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e7-12.dat upx behavioral2/memory/1884-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 393f2ea136d48a8bda21ea90ff206f18958058ccb6ebbc80f92c0ee230105f41N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5433eb7e42920a78b0c2d2dc7572b68cc
SHA1e1eb3ec3f588fa0d1a9341acd678576ac0bb9842
SHA256f2ffc99572d9956cd5456ff9f23996611f4bbe9ce4e0dbf431309fe624800b81
SHA512b36fe9e149b0e9cde07795256ae91ad4d20615b36eca71917820741d4ffeb93c8f8a3065e926178036ce6da49156536ede2b22329d1ac0bf8c5462457330d1d2