Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 07:49
Behavioral task
behavioral1
Sample
5b078235c01840a0547df45f7e18c4c08c881ef25d5eebfad99a71f1dddd6eceN.exe
Resource
win7-20240903-en
General
-
Target
5b078235c01840a0547df45f7e18c4c08c881ef25d5eebfad99a71f1dddd6eceN.exe
-
Size
83KB
-
MD5
77c4ab815541fc0069f057ae8128e530
-
SHA1
8953dfe538ed27040b7c3a04198dd3137a76ac09
-
SHA256
5b078235c01840a0547df45f7e18c4c08c881ef25d5eebfad99a71f1dddd6ece
-
SHA512
9eafc7a082a26bc8bec5076e30463d487971e657c35edc7ef4255cf51c75a8d960ebdfc19ab6fc1b14be7deff4071648b90d16b73674605f74f324b787e7594b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3144-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3144-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3144-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e2-11.dat upx behavioral2/memory/3144-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3144-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b078235c01840a0547df45f7e18c4c08c881ef25d5eebfad99a71f1dddd6eceN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50fdf7eda4f9290aa26f83aecfb7b4423
SHA16ac54b587fcea8077ad2db42e5e2835f0a3686f7
SHA2561794629827eae34b270ed0fd1f0dde31a10d1f7bf44926aad4238d315d09d057
SHA5120742e5fa73e2bba5d0b9d23de835a8fc2711d72267dbbe41ef9ca17144ee62f20640fce8f08ba0a80094122b72fd1016144ecf74c3491b698c34543ab6cdb392