Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 16:52
Behavioral task
behavioral1
Sample
a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5N.exe
Resource
win7-20240903-en
General
-
Target
a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5N.exe
-
Size
236KB
-
MD5
18be29989828f828b81f958781b271b0
-
SHA1
a693e0b6ab9f80db6b68bea14f214cc437592338
-
SHA256
a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5
-
SHA512
0542c91cd3c2b6d3c5edc4c0c91bab9ba0a6a3d2046f8848b58a60877388a095568922412fc4e9f8b46a8417bbf4bf29d193c014942391cd7a9e1665371ae053
-
SSDEEP
3072:4J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/Y/FnncroP9:8wDeM7iNEkgiOb31k1ECGJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3684-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/3684-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023495-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a02bcdb0b907431a6e09e8af275af40e15a5c073654a2cd1839ebcffd066a7b5N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD53ed628e37c877c56279f0098bf486bf8
SHA10d5ec578a1b84c84eb1ff6d57fade75c47178a1c
SHA256608de185ef3050e2e284ced0de7327440dbc375ecd101b256f6b781cd1037e2a
SHA512bd553d185ef5a9abada53e561479bb950a31616576284fc89acec4c8a0a8d91f4b6cac3f49d7014b8ca2d51dc206a7546b70f03d3110a53088b3840e350f2364