Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 22:43
Behavioral task
behavioral1
Sample
df77803d2a3ce8bd243e0a287a71addfe6af1c4c463053fd4d445e50cb7edea5N.exe
Resource
win7-20240903-en
General
-
Target
df77803d2a3ce8bd243e0a287a71addfe6af1c4c463053fd4d445e50cb7edea5N.exe
-
Size
83KB
-
MD5
e425ef0eb3b01c5c88900f0584401700
-
SHA1
69e0bc8b593a411484906492deb21d8176efd702
-
SHA256
df77803d2a3ce8bd243e0a287a71addfe6af1c4c463053fd4d445e50cb7edea5
-
SHA512
9f885808c84fedd4225b6382e8aa6f20f6af2910a999dbe90d23fc0802acf66d51b099d078bac7166b9d4a4a46640bc9fb87fa615c41661871e9e62aecbf786c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+KK:LJ0TAz6Mte4A+aaZx8EnCGVuK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2496-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2496-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2496-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2496-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000200000001e3c5-12.dat upx behavioral2/memory/2496-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2496-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df77803d2a3ce8bd243e0a287a71addfe6af1c4c463053fd4d445e50cb7edea5N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df77803d2a3ce8bd243e0a287a71addfe6af1c4c463053fd4d445e50cb7edea5N.exe"C:\Users\Admin\AppData\Local\Temp\df77803d2a3ce8bd243e0a287a71addfe6af1c4c463053fd4d445e50cb7edea5N.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3692,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=4668 /prefetch:81⤵PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5b574f5eae98106793e47d82b1b0af7eb
SHA1a77f8272022507c67dfcb14aef4e3eb931787b3a
SHA256deb5b6d290108d74ac283558a2b97330981feb31b62245018f7591c66fc4dd93
SHA51258ac749bd1a963add23baaa04728101ba0571f322cf100c23f653be1d82780ca7fe8ddc80bd20f8aea57ba88df185a378ab4ee9cb03b93c72246fd5795d1441d