Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 07:42
Behavioral task
behavioral1
Sample
b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991fN.exe
Resource
win7-20240704-en
General
-
Target
b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991fN.exe
-
Size
236KB
-
MD5
21a1abe7f4e1f13bf98e23a843d7d430
-
SHA1
94ec80c8ec62ea030d4bc8dc416d287a4b14b1d3
-
SHA256
b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991f
-
SHA512
f2b2577be09b84c9a24d3493f23bb0a00407cdb440a464015fdba8b1f02e2aa4c80e1ce733851f00ca342184c68a74779ed2cb9a69e327a3fbc0c672545cece1
-
SSDEEP
3072:9J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/k/FnncroP9:nwDeM7iNEkgiOb31k1ECiJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4564-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4564-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023464-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2f3ba1bc8df1dab7092f3c54382b7bb37db28fdfc1ca14d685df5c41c16991fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD50e4c72834fcae108950d5d18ba57f2f2
SHA12bdf30e8473cd82ee8d6f45efbf219ab9ea6fb34
SHA2566b79194b81a2fcfc2f91f8a05ef4069f7657cb6a145e39d22032a5a0ea7f2850
SHA512ca1e00514f2a26fdfff22d770bb54223a4fb137bc3a5ece90bed3568ad746a28eee8379b8d9a3f10ddd8ac01c1e4edb80ad1b82ffb0ae6098a61c348dc22d515