Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 19:26
Behavioral task
behavioral1
Sample
6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65ccN.exe
Resource
win7-20240903-en
General
-
Target
6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65ccN.exe
-
Size
83KB
-
MD5
f21c6c891cdb3ebc7a463e0cb8f6f170
-
SHA1
6c148918bcb70590cfaee456953a0076bb758e3a
-
SHA256
6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65cc
-
SHA512
e88a186ae0687586e55aecd16b3abd5e4d28afbf101bf7ea0ed036854b361ffb46b382660007031d78f5a8b77e03699645461f55fe2f16edbcc29a869bfce0c9
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3876-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023461-12.dat upx behavioral2/memory/3876-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3876-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a182baf6f7c2a1fb9b6d52de8791a36fb2c2fe3312d217b275e459dcd1c65ccN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5eb88d177cc0440100cb91304e6ef2052
SHA1cbd84e38a8f0dcb662454073c4aa50d20fffc861
SHA256783d8068be307bd4135aa8b1b982f6be1087b15e2cb3a4255b4dc0a1892a4752
SHA512a1678dfdb8b5e6e6bfcaa63c7edc10ccf15f6e1465ed2b57a080dfd33f2ecba30dc3ef3f1cef44e35cb667b3b4cf8c2145bbecb9798ec83a28c061960e2729e4