Analysis
-
max time kernel
111s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 17:40
Behavioral task
behavioral1
Sample
c463f2c855f08c73ae6ab2e8caa2b847aaf2e57fe65943cf9fe435ffb2bcf8d6N.exe
Resource
win7-20240903-en
General
-
Target
c463f2c855f08c73ae6ab2e8caa2b847aaf2e57fe65943cf9fe435ffb2bcf8d6N.exe
-
Size
83KB
-
MD5
4552e8b6bcd657573405bd9c39721fa0
-
SHA1
1121a2885b6a320f26469d0f18bf901731ff879e
-
SHA256
c463f2c855f08c73ae6ab2e8caa2b847aaf2e57fe65943cf9fe435ffb2bcf8d6
-
SHA512
4d172c7a626e918712af631d0d4e21f5f4c5956cf1f0f6223dccbf987fc0080e2153708de08f6b8921a019159cc602dac3c008e5fdb0e08e060907481b1e9258
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+DK:LJ0TAz6Mte4A+aaZx8EnCGVuD
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2700-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023471-12.dat upx behavioral2/memory/2700-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2700-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c463f2c855f08c73ae6ab2e8caa2b847aaf2e57fe65943cf9fe435ffb2bcf8d6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d3baa5edc6b6a9545c32843abe60265e
SHA11a0b5c21e3adc8480f8110bc854a7d7764a27d68
SHA2560f8ed99920d049618be5b1bf4e54d78d72f10daedf6075a9c950f7eaa5c35cec
SHA5128dfb8ae8aba351f64d80ab7ab418aeb78ad26247014791250bdbe7a692d28dcda140c0cc0e4c49b2b70217aba2ad0d50292b8674abf58868cccd2d0997060506