Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 23:58
Behavioral task
behavioral1
Sample
afc432fab88b7258fa57cd24bdaefe0a8e8bb6c1e8843891bcec3db957599580N.exe
Resource
win7-20240903-en
General
-
Target
afc432fab88b7258fa57cd24bdaefe0a8e8bb6c1e8843891bcec3db957599580N.exe
-
Size
83KB
-
MD5
9acb54789f2d8e000d7093d422a9e490
-
SHA1
8f8596aba7d91e2833b400c121da4b7feb9b3100
-
SHA256
afc432fab88b7258fa57cd24bdaefe0a8e8bb6c1e8843891bcec3db957599580
-
SHA512
d74ceb2eebf2819662ef662e2d68c8e68e8a6939999067d8043c4b284bbc2586bcd64e9c37f20b35168445c4edb7a03321e1ec0e4cd80ab80346a8ff41447b81
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5096-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5096-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5096-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5096-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000400000001e360-11.dat upx behavioral2/memory/5096-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5096-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc432fab88b7258fa57cd24bdaefe0a8e8bb6c1e8843891bcec3db957599580N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57b358246a5984f1569e4ccb7289dc9c0
SHA198c7a4c55d4024fb98d2ff13d6c5cf5967b06a7f
SHA256111190d5bb38f263c7c3ac399ad806b2df7ef2bf5a826e1748986c1c530bf2bf
SHA512988df9929e0bc61685e1dc13b0f06c550e11c6d3f67e9b80e1bb63b6526ac64f67abbfe751f0322ac2e5eb4a016734b99f74db322fb64a4c5137fb9ff60d67ee