Analysis
-
max time kernel
120s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 18:25
Behavioral task
behavioral1
Sample
a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219N.exe
Resource
win7-20240903-en
General
-
Target
a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219N.exe
-
Size
83KB
-
MD5
b3e55125a3aab82e50017fbf172bafd0
-
SHA1
e1c0a011d1a697a9e1038d92f78a66fa19e0d604
-
SHA256
a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219
-
SHA512
450cf82576a9b43c2ad9e60c96f31bd202edcd387f792352dd575040c13661a6a24db848a18952f7aeb1bd674b9ba7628b7370e88a41fe875030e69d9937796a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+VK:LJ0TAz6Mte4A+aaZx8EnCGVuV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2516-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2516-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2516-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2516-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023447-12.dat upx behavioral2/memory/2516-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2516-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4959c9473dcabf1b3a87feeb7554714a748e897e22bb81f6f9dfe40fe9f3219N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5123bc783a4f445ad8d31dd6583913559
SHA1b36efbecf3a05ba69aba9c3022a3bf20b917b80c
SHA25651688a4dc9dbe5ecfb72bd193cae720e0eb6ca42a5d8e81dd7d57f9759648e39
SHA512c675a0e57c39bc682ef7a378794b2afc9b6ed44b31dadc4f5b817232e69e7e1e2c5ad05892855e62dc05907895eacd74d632f6bd3a05eba5af89a1ffa4c095c6