Analysis
-
max time kernel
111s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 13:31
Behavioral task
behavioral1
Sample
37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8caN.exe
Resource
win7-20240704-en
General
-
Target
37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8caN.exe
-
Size
83KB
-
MD5
457709cad086a8ea2f10e9e2a0b036e0
-
SHA1
f9d1c0a87fe6044ecaad6d3833d8fc11f3eb8984
-
SHA256
37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8ca
-
SHA512
e5cec1d77922b04af3be51e466a531d6e27ad7735c2f25326a29ea50b3c4103f2a2c6dd50ae285413a35ae6ca01303a4f750f55e5a0fff36cb5a6c519a25da57
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+KK:LJ0TAz6Mte4A+aaZx8EnCGVuK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2740-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023469-12.dat upx behavioral2/memory/2740-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37e5b8f45b93fdf6d2d68287a61fe02cb10237a6c13b30d667ebdacd42c5c8caN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d0963ffb0f1ce06845efdddc924f882a
SHA1fac8817c4e16becd9e902348063d179426baa658
SHA2568672cdbe8a53d5bc1c11b86eee593eee6d3db8994743f62eb665a58e5a6519e0
SHA512bf4e760960cf61ad3d157c72d7754fb158e074f9991851db78fa9a1e617c41a6f0547c26e90155f81c898f645551c09ea0fc4775972c4bcdb10805ebac9ab2fe