Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:02
Behavioral task
behavioral1
Sample
eb829e66fef737eaa34274ecf53ab198f1dfb8ebc76d7071d4ea1b1a188c7434N.exe
Resource
win7-20240903-en
General
-
Target
eb829e66fef737eaa34274ecf53ab198f1dfb8ebc76d7071d4ea1b1a188c7434N.exe
-
Size
83KB
-
MD5
3c8aac0c86d7cadc1a2b036a49cf8f40
-
SHA1
d937bb72430c3976ddcc7852b6e6af92df92ef75
-
SHA256
eb829e66fef737eaa34274ecf53ab198f1dfb8ebc76d7071d4ea1b1a188c7434
-
SHA512
9a2c0dc7ae1d84f2f50105b0a6024c58084f77862f8ecb9daee11d172db4842a547196c581295acf0573bb4c9180d9ab33ae7fb0b7d8672f68630968914d1e51
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hK:LJ0TAz6Mte4A+aaZx8EnCGVuh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4604-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002342a-13.dat upx behavioral2/memory/4604-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4604-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb829e66fef737eaa34274ecf53ab198f1dfb8ebc76d7071d4ea1b1a188c7434N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5fdc769a6c2db938d66385bd7ef2dd7b9
SHA10e1a82e7a7b0502f22709b9236dbfc7073b8ca45
SHA25613e4f180b901a4c6a95b56c89da174e073d32208d7bec123ae8ef2496b728330
SHA5127d5c803443243bf7fa123c6b1adb01315d2206e486427330d00a76265f34c8aa317ab9a97d4d263f2fd5980887abcb4dc977ebc77a7f3a277bdc15916e70b924