Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 11:59
Behavioral task
behavioral1
Sample
c0e46a726046ac88f59abb3c02d3635d4c7864e934ba878fb5aa4c000d614e28N.exe
Resource
win7-20240903-en
General
-
Target
c0e46a726046ac88f59abb3c02d3635d4c7864e934ba878fb5aa4c000d614e28N.exe
-
Size
236KB
-
MD5
39e2ec545807cc9aeb44389ae8012400
-
SHA1
07309ef45dc5b87f654aac6e743c0912d22e90c1
-
SHA256
c0e46a726046ac88f59abb3c02d3635d4c7864e934ba878fb5aa4c000d614e28
-
SHA512
983357542cb56e85e4b9c531de1d10d43b07bf6f25ce760dce5782ce552bdd37c2a4a135a7f3e0a05f5b5a3afce5c02743c12f2d91c29d14dfff5d6210cd48d0
-
SSDEEP
3072:GJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/6/FnncroP9:qwDeM7iNEkgiOb31k1ECMJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4340-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4340-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x00080000000234ee-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e46a726046ac88f59abb3c02d3635d4c7864e934ba878fb5aa4c000d614e28N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5a4c7d1ca1be70dc7cabf8004beb7ed8c
SHA1882d721bbb662e313c3b1e88eaeabcb5066f1d4d
SHA25602263cab7dc42ad76516b0945f8c001d0cb2e24f440b94d93e6c05a5cdd18d48
SHA512bb37b78a7a15a95294666a8718e6992796d271f2ee8e5e505aa4f3b63e3e085f21ff1ca977094105e3e129a04228132b547a419f6f376046e6fe6424550acad5