Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 17:22
Behavioral task
behavioral1
Sample
e94b0068f60bf7ca9d7bba7d919b787662bacd180f7917eb3a6e3cd36826d1fcN.exe
Resource
win7-20240903-en
General
-
Target
e94b0068f60bf7ca9d7bba7d919b787662bacd180f7917eb3a6e3cd36826d1fcN.exe
-
Size
236KB
-
MD5
3cd6a54804ad2c4633bf2c880c4a8b60
-
SHA1
70b3bd12b449f3331da27ac8aa1855163dddc951
-
SHA256
e94b0068f60bf7ca9d7bba7d919b787662bacd180f7917eb3a6e3cd36826d1fc
-
SHA512
8b585516a58e1ecee884bd46ea05e7a14f29b5c3b1d21956b16d66391974b9a37ed3bdc7a914cb9755d9a5f3c47b32a5cda44c86ce8c831daad344f508047c29
-
SSDEEP
3072:iJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/S/FnncroP9:WwDeM7iNEkgiOb31k1ECEJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1572-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1572-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023445-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e94b0068f60bf7ca9d7bba7d919b787662bacd180f7917eb3a6e3cd36826d1fcN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD549b2c35e850d90ef3d39eda2f7cc066f
SHA1d0ecc6ae2cce692286c3394e48c044c7ebaa1434
SHA2569acd1488e6505be996b1dc940add7db84e07bb2781ebe958074f0b3fce2c951e
SHA512e94072f281ced826f234d13a489042055bb48d0d9e93452de6fb7b1c9bb5b3565ce57fa3effe1d985c0cf148aa2c81c7772cbc1310edb4601db48c7517c5aaed