Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 23:57
Behavioral task
behavioral1
Sample
f784bc1e42e3f509e0b459f037513d1607b32363f2ba431ed2af96af2846ef21N.exe
Resource
win7-20240704-en
General
-
Target
f784bc1e42e3f509e0b459f037513d1607b32363f2ba431ed2af96af2846ef21N.exe
-
Size
236KB
-
MD5
33fe4a8f9b3da2880b3fdc663fde0490
-
SHA1
7e972acd45849d6c292c121e945ed2c530c38aa9
-
SHA256
f784bc1e42e3f509e0b459f037513d1607b32363f2ba431ed2af96af2846ef21
-
SHA512
0d5a32eb8416dbb16b89daf6812154df8f20d85bf746061a2bc84791f6506bbac42c6c62ccdc047f8269e036b62b9bfa31f5c76dea7ca5495098a24f92b32246
-
SSDEEP
3072:QJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/Y/FnncroP9:0wDeM7iNEkgiOb31k1ECmJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/872-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/872-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000800000002344b-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f784bc1e42e3f509e0b459f037513d1607b32363f2ba431ed2af96af2846ef21N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD503dc223b4be6538f1586a5f594b4c1ec
SHA1233404a66075e9f27a280fe8f27e179070a3b99d
SHA25674dfbffe21cc437613f96908c2d4ccc0446b440a3142a028d2489e2682fbf7ad
SHA512700f71a16a76883b00b2055fe302cb01f68a02976052c26b9a35509a466cc272560d03bc299ce5a8c841669ed612fe18680345f95750a61fc6093c08750a8ad0