Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 04:33
Behavioral task
behavioral1
Sample
f8a8c7a200b6619f631bea43518537a00bfa9f73801a7264e39383eb9658fdd5.exe
Resource
win7-20240903-en
General
-
Target
f8a8c7a200b6619f631bea43518537a00bfa9f73801a7264e39383eb9658fdd5.exe
-
Size
83KB
-
MD5
a71dc8437cdbf4b956fbec7198aeac1c
-
SHA1
97750331ef3f9691dc42f5068af4d1813c7de4d9
-
SHA256
f8a8c7a200b6619f631bea43518537a00bfa9f73801a7264e39383eb9658fdd5
-
SHA512
df7d474b85ab5486f124fe5f66323ea52e2e06c4c69092da687ec39785432f3bfdcdf0ca661c68712b5181789a55b82281036c83049394e0b3d1a3250bb043b7
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1672-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000233eb-12.dat upx behavioral2/memory/1672-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-22-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1672-29-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8a8c7a200b6619f631bea43518537a00bfa9f73801a7264e39383eb9658fdd5.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD520e109f19fa6083200813d6f62b36767
SHA14392901228b9972e127425b6093dbe453b8ec192
SHA256ec32aa4820c623ddf5d6bae05ba42bcc0379753229a191faa4f1e7408b80295e
SHA51280e67d1d1aea22547a72ead3cdcec19e7fc31ad7e40828af324fdce2831de50a5b6f2d47a9450d6cd265b98c8ba0884521447aabe6316ae223a6f570e9477015