Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 16:18
Behavioral task
behavioral1
Sample
710d058b8a336fcad0ae33f96d7df02bd21b8e190aa6ff5db1395d44f247d5e6N.exe
Resource
win7-20240903-en
General
-
Target
710d058b8a336fcad0ae33f96d7df02bd21b8e190aa6ff5db1395d44f247d5e6N.exe
-
Size
83KB
-
MD5
610f9988cf2c3f1fe581cfddd79cc270
-
SHA1
e79a023ddfdb53d464ba5cf5c5700f46cae26ba3
-
SHA256
710d058b8a336fcad0ae33f96d7df02bd21b8e190aa6ff5db1395d44f247d5e6
-
SHA512
c3296459bdcca7dae981f7bb30d127e2036b3c3ed412b4cc6b9a736fa80d4bf90e5d84db990d716ebb8ebec72105566d36657f98a1ba34586595795f5f90c1fe
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4836-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002344f-12.dat upx behavioral2/memory/4836-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 710d058b8a336fcad0ae33f96d7df02bd21b8e190aa6ff5db1395d44f247d5e6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD55f89438584ba16e401bb13e1ec74ae3c
SHA1fdb65a55483ff7eb61842fc190b9b6c9dfd7c98d
SHA256b6480efae7890a6f2f2449f7aff17f6d3394651adfb3f9f3afa00444265c7e17
SHA512991e2d36c15770e87e1963f188158038f0a5827c19b02a3ed7532e52e2740fd4f5b121afceb3d2b9549741637e19114206c0db097f1cb5f983cfad9e9edb7847