Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 13:06
Behavioral task
behavioral1
Sample
cf48a8ef135bd22ef32b783e66e4c1b44f32680d185a91212a867bee9b49b819N.exe
Resource
win7-20240903-en
General
-
Target
cf48a8ef135bd22ef32b783e66e4c1b44f32680d185a91212a867bee9b49b819N.exe
-
Size
83KB
-
MD5
fd55ce6e78ec54102600cc6a5e03d810
-
SHA1
d3b4e1ef263d7713ccd6b7b97ef89c701a1aa5a2
-
SHA256
cf48a8ef135bd22ef32b783e66e4c1b44f32680d185a91212a867bee9b49b819
-
SHA512
df667eceaf7f28c71c47cbbc2c5ccd99eea06c0882acfa68d02f743ea076ec536815714de02f9738643dd2c8afffa7633b75d04f9e7aa61278452286463fbf1c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K:LJ0TAz6Mte4A+aaZx8EnCGVu0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3640-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3640-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3640-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3640-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234a7-12.dat upx behavioral2/memory/3640-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3640-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf48a8ef135bd22ef32b783e66e4c1b44f32680d185a91212a867bee9b49b819N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5131a535f4972dd1b1f9e3196f3c3bac5
SHA12eb73a139503e254d6088a16815374e2ec75d7af
SHA25652d97360bfc41010fb1f13959440558a60890c304c9072695cd87771f95a0dd7
SHA512eb366c7329211296d7670a02aa0b35eb666b46a58c533385cf9103f61cb4a56b3c1a8886dae6c2655089d4dc70fc8b2838cceeabcb5057a32471fb44a932597a