Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 17:07
Behavioral task
behavioral1
Sample
3efe1645899d988ca6ddf9a869437e21423bf67b48c3fabc0e011f43f33b8879N.exe
Resource
win7-20240903-en
General
-
Target
3efe1645899d988ca6ddf9a869437e21423bf67b48c3fabc0e011f43f33b8879N.exe
-
Size
83KB
-
MD5
885fde6bffc9fc5b3d3d157a5d756f30
-
SHA1
57ee1415b18bcab0ce4e220d820ae410afa46cd8
-
SHA256
3efe1645899d988ca6ddf9a869437e21423bf67b48c3fabc0e011f43f33b8879
-
SHA512
e1060e426bf322ac3e4c582aa940b8e6e2ee14f6c7407dc3180ede2c175d82442653e9ee0c08964793a4c94493fb0012235cfdfbc92d4280f8814037c190e19d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+uK:LJ0TAz6Mte4A+aaZx8EnCGVuu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5036-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5036-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5036-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5036-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002343d-12.dat upx behavioral2/memory/5036-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5036-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3efe1645899d988ca6ddf9a869437e21423bf67b48c3fabc0e011f43f33b8879N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5965617d2b5b11b239566c5544fe28a03
SHA180839bc68883a4e84e03153797f9a86bdecb2dbd
SHA256522cdef11888b32018f76934ef39f1f9928680bca7c973f86bd2aca6ab824343
SHA512a6e76af4668ba20aa6ed60771448dcbc27027c7d39612b7c59fa7da33884cecc41799cd0d918cdaeda377e5c317e486b6d60098f982bb0544a7b78bbdcd68fdc