Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
Octane.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Octane.exe
Resource
win10v2004-20240802-en
General
-
Target
Octane.exe
-
Size
1.5MB
-
MD5
a381acf1c9b1ab0a5912285f40fca081
-
SHA1
e7307916e979f5e8524ef28272e4ba6c673f289a
-
SHA256
8bb4b062348ad5767bc42bc0fb0600bd9970b63638058787a969cb7b04b29370
-
SHA512
6c43b1139d4c2b90d99ab41fa21b22b36a544dcdc77e986b87bd7228aa6c9611c4b71d2e6d5aeca3d6fbed99089596edf0d24a5a52eac713cad1fec0dd93a754
-
SSDEEP
49152:8M1msa5cMzWut9qYR9kqXfd+/9AManCL:8emHHWg9q+9kqXf0FtWCL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Octane.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Octane.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Octane.exedescription pid process Token: SeDebugPrivilege 4412 Octane.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4412-0-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/4412-1-0x0000000000BE0000-0x0000000000D72000-memory.dmpFilesize
1.6MB
-
memory/4412-2-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/4412-3-0x0000000009B40000-0x0000000009B48000-memory.dmpFilesize
32KB
-
memory/4412-4-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/4412-5-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/4412-6-0x000000000A010000-0x000000000A048000-memory.dmpFilesize
224KB
-
memory/4412-7-0x0000000009FE0000-0x0000000009FEE000-memory.dmpFilesize
56KB
-
memory/4412-8-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/4412-9-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB