Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 23:57
Behavioral task
behavioral1
Sample
79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8N.exe
Resource
win7-20240903-en
General
-
Target
79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8N.exe
-
Size
236KB
-
MD5
0bbeffb41c7eb7fd85873020a16311f0
-
SHA1
d5874674dbcbc44847a54a50a70393eb9cad89eb
-
SHA256
79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8
-
SHA512
b2c167b1a8d647a4ec84f84a1e67f3cfa1b1a7b2b1eb078e4641c2741b66505fb551a0b9ca9c7a1ec881c3ce0dd6d19d6a915b7169fbb3dc1887ba2df1efd12a
-
SSDEEP
3072:ZJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/6/FnncroP9:jwDeM7iNEkgiOb31k1ECsJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2888-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2888-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023450-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD57bde93941dd46d02d4d7a6fcf8dc4778
SHA1ed72451dcddba73a78023cddb13332b2f68cb0d3
SHA25635f3123a8bdd585184c70a05e2b6d31cda06c4c93149706727dade5d11dafe14
SHA512b6e6a1fc32685c5666405d52c2a4f16253a0604d6d46b597788f2959d689448d8745a50103ea45dbee6d4aadeb54c75ada3e66d219f5415b0cdff5820b6e74ea