Analysis
-
max time kernel
110s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 17:50
Behavioral task
behavioral1
Sample
0c910207cfb109b6594cc08b84cffc775cff0319deb32cb18a88448863d9b90bN.exe
Resource
win7-20240729-en
General
-
Target
0c910207cfb109b6594cc08b84cffc775cff0319deb32cb18a88448863d9b90bN.exe
-
Size
83KB
-
MD5
85d6466de26d27d7c3e80c63b35bdf90
-
SHA1
d37a25b6ca6aa9ac709b7b4eea102f703f6ed830
-
SHA256
0c910207cfb109b6594cc08b84cffc775cff0319deb32cb18a88448863d9b90b
-
SHA512
8f0ea3ff2533b70acea49ca532ff1ffb1ad5934eb6d9c5ed3e4ea57efa4d3c094b36bfd92519383b58877822bb901f9f4229b265295f895c1f5a026bc58c4ccc
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YK:LJ0TAz6Mte4A+aaZx8EnCGVuY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5048-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5048-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5048-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023456-11.dat upx behavioral2/memory/5048-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5048-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5048-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c910207cfb109b6594cc08b84cffc775cff0319deb32cb18a88448863d9b90bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD577327d98d58eff54491307b663d662b6
SHA1fd3d23dc18b27c35de7ea7e3967305d509b60c17
SHA25638a5179332cf0586b6c399540f19e1fb682d188a1665475b511e68e58ebfeadb
SHA512fd17494a9a5e6ca9c0e208b240d7a1aff4f9d70020b149f148a0b8137a4b8189ebe0306a5a520e9b55c40ab444271fab8cd2243bda732541b62df208ca34b1fa