Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 12:31
Behavioral task
behavioral1
Sample
61d4f729eb84555b924953dd885039150d0be467cf3fc04aef95a77fb79cecfbN.exe
Resource
win7-20240903-en
General
-
Target
61d4f729eb84555b924953dd885039150d0be467cf3fc04aef95a77fb79cecfbN.exe
-
Size
236KB
-
MD5
843b58177a0114609e7f96636a67d840
-
SHA1
1f2e6e0051d8e8d27ba446deeedfdb02df7d1327
-
SHA256
61d4f729eb84555b924953dd885039150d0be467cf3fc04aef95a77fb79cecfb
-
SHA512
04e2c088ddcec239ede963eba47efe7a4a00597c34dd6edb012c1c237b90d41afaf8ca009539bc850e1871586ba646908912c729edcffb5f0a009a01682c4e49
-
SSDEEP
3072:RJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/L/FnncroP9:bwDeM7iNEkgiOb31k1ECrJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3368-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/3368-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x00080000000234ef-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61d4f729eb84555b924953dd885039150d0be467cf3fc04aef95a77fb79cecfbN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD50005d38a27b54604c5e9a055a7c89395
SHA1e36b292a9a6bb15f0ff8db3d1ee3464fa74c1d66
SHA256a7022c8b0f1418c7ea8c424d1c5dd385275bc5679189d80d11f369ca6f17f17b
SHA512c3a2c8bfc8ddb40e4cb77533cba2de72b14bdcab8caf58de5a7f5d80ee91bfc2a9e536c2bcb24d4561a8969272a52237d1765478213f91eeced431b9e5e17fdf