Analysis
-
max time kernel
111s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:05
Behavioral task
behavioral1
Sample
ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45N.exe
Resource
win7-20240729-en
General
-
Target
ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45N.exe
-
Size
83KB
-
MD5
92d3b218cdac5e912450662199879440
-
SHA1
a207d8aced89ff406834b613421a5e440adf36e7
-
SHA256
ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45
-
SHA512
31fa90c03a5db2bfa30024eca9c0b881750ae99c928baa151a23f255254da476a5717d89e2ca6fbeacecd370fa61b27c096e4b02296c5ca348c9225c2192285b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+HK:LJ0TAz6Mte4A+aaZx8EnCGVuH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4876-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4876-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4876-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4876-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000021a6e-13.dat upx behavioral2/memory/4876-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4876-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddd2d7fc05bebfd5ce37692d2ecfba695a9942e6874857a531898f1ec1769b45N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cd7342919a6ed2728a6d58f3aa44e4b6
SHA14eaf9a4ef6c347fa20f24081462f54a6f5a34ffb
SHA256c7afe16b5b3de7180c4c0b2b051ad20449696e64a6abc14b63a7343fc9bb03e8
SHA512e4064299ed5abfbdb0e3def26e995a022e7653ed157abbd78f689b631383fb32d4bbc6b16b12cea28d0825a325f3e98ace7ce2c5a2c891a35f59a9a73f513d77