Analysis
-
max time kernel
111s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:34
Behavioral task
behavioral1
Sample
101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe
Resource
win7-20240729-en
General
-
Target
101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe
-
Size
83KB
-
MD5
1555c6193a5addda430c77e8709e5e80
-
SHA1
3aaf1221d8d561973c6f64f13ad8d246466054b5
-
SHA256
101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41a
-
SHA512
80f08e89c64cd2343c1820b42fbdf10bd8110815c129a77069014f1d72c37862706c33b88e6bcf884b21baca62d3dfa49b81d7296fec790672807e5cca45838a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4988-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4988-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4988-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002347b-12.dat upx behavioral2/memory/4988-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4988-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 101e88d434309049326cc62c525398726dffde4f64ca54f1529b7f5edabdf41aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5563660d4c959417ebda8d87f67f849b2
SHA19baee53c1cdd584b25bb929c19123607b9934ff5
SHA2562b9c5fe6e8f722fa41bf66fa529c8d181093d647a2abcca6e41959a26e482265
SHA51295f9613a9e5a5c0bacfc227475f9dc4433ccca2c0cccae70cf88282a7dc261e46060bff57daf637d46b756c5fdc75850e8793af4f85fe71c17f65539e192ae9e