Analysis
-
max time kernel
111s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 18:13
Behavioral task
behavioral1
Sample
5f84b8abe9b820e1e0f21b0d7de8335c6d05b933bf853387c79423058d982c9cN.exe
Resource
win7-20240903-en
General
-
Target
5f84b8abe9b820e1e0f21b0d7de8335c6d05b933bf853387c79423058d982c9cN.exe
-
Size
83KB
-
MD5
3c5fcfedb40c7b42d0390ad192b27ca0
-
SHA1
33bc6232bf5a280d97b7fdce0dd68fc9c4857dec
-
SHA256
5f84b8abe9b820e1e0f21b0d7de8335c6d05b933bf853387c79423058d982c9c
-
SHA512
98b489d91a3e1390085a24ddbfcb6e41856e7df9ccfd49fc0d20b84f6da08a3d94346fe675b5b6d27a1336586d5c6396da97dee7b2471a325559778d8c832c8c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/456-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000900000002334f-12.dat upx behavioral2/memory/456-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/456-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f84b8abe9b820e1e0f21b0d7de8335c6d05b933bf853387c79423058d982c9cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD560e94701d74adc47d361c12a0f2afce4
SHA16d89bd571e3c83d48b8acc2d1d83885f1449a27c
SHA2569b6da66ce2179b8c84b93b987d1ca4f0c5f7b5b63111adcb0856538a3c3af1ad
SHA5128d972a1559d9a2bab64258c58e2568b55708c5101c88d1c37267d4444309234a278e322ab8ad25cad993c374d877ba99231b57cb8cde2aafd29ef4c6473ccc2c