Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 23:15
Behavioral task
behavioral1
Sample
8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46fN.exe
Resource
win7-20240708-en
General
-
Target
8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46fN.exe
-
Size
236KB
-
MD5
f774097759e02ea22b9c7489e6067d70
-
SHA1
9b02bb2151fadebe7280a33f0525f769f2510a46
-
SHA256
8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46f
-
SHA512
2f653e7bc2d2c509faa2e912ce9151ceb7e8bed9845c29925eca054543903e2052f8cb5ce00fa3b70e5dde85edd021df387c1978b450fa0cc2c8a9446152a8f8
-
SSDEEP
3072:nJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/x/FnncroP9:JwDeM7iNEkgiOb31k1ECtJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4056-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4056-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000800000002347c-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5c933d9e81dbe508e790d54384c4cf772
SHA1459614001a7187f872b2bdd153151a974fe0efb7
SHA2566346512e35be6eb289a071e467d6f771ebe9eac3f6d2c05d01cc2e0f152519a3
SHA5122249ced8cecca327d97276c231ae0bd8aed452db369d04f7f365486f6cdedce9d02790bb95d6f6c44a5ef925ef575e0e2d1a549347d02af7cdfaa95ecd510568