Analysis
-
max time kernel
111s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 08:37
Behavioral task
behavioral1
Sample
1c0415b73dbf99859e0b955a7522405af393dc4b8c620df987a29306673bb622N.exe
Resource
win7-20240704-en
General
-
Target
1c0415b73dbf99859e0b955a7522405af393dc4b8c620df987a29306673bb622N.exe
-
Size
83KB
-
MD5
93cfda728ddfe0effcf09e7289bd25b0
-
SHA1
0b82ba24e2e8ff5bfb1e927cfbfc52afb4085a0c
-
SHA256
1c0415b73dbf99859e0b955a7522405af393dc4b8c620df987a29306673bb622
-
SHA512
a2e676bb3e25042b4bdc0f8d9a24f477f729d292714d843d4b0a82881941f6f08aacc984ed56933c91412ba8476c829f858a6301239f5ed70ba778dde307a046
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4676-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4676-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4676-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4676-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000300000001e748-11.dat upx behavioral2/memory/4676-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4676-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c0415b73dbf99859e0b955a7522405af393dc4b8c620df987a29306673bb622N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD55e7ddfa518089c8561006819069d81b0
SHA16b47409cd6ccf6401af122bec108f1df252e9ab8
SHA25658f03d2d864351b536901ec88ac834cf8cb189e0b866f187056e6c8ccc3587a6
SHA512311fd7b311df569aa788115aa2d8a2d01d87edf509df5c3784e2d0ba1849945fe776b96987abc95bb40e8d69c505b443e649509183411bfa415cbf586cfa557c