Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 00:41
Behavioral task
behavioral1
Sample
514972296f61cb921f6a4e5241bfad05be63f68988389cb54a4823a51ca3108dN.exe
Resource
win7-20240708-en
General
-
Target
514972296f61cb921f6a4e5241bfad05be63f68988389cb54a4823a51ca3108dN.exe
-
Size
83KB
-
MD5
1d041b29dc129f3235f27c080a6d3cb0
-
SHA1
6ee1c8c04fd70fb352a1917eca0310f7c8d20fa7
-
SHA256
514972296f61cb921f6a4e5241bfad05be63f68988389cb54a4823a51ca3108d
-
SHA512
8132b25cad886c3be2fdcd337c1fd68a6d59235315fb3cd98145aaaffc70d490b8bb5df7e72ce0f8ff522091459f5fd1fa6e9ead4c67713587c3f5e8b055eb10
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3972-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3972-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3972-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3972-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000d00000001e360-12.dat upx behavioral2/memory/3972-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3972-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 514972296f61cb921f6a4e5241bfad05be63f68988389cb54a4823a51ca3108dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bdd187aad45b43b3dfc5c5ceb973e2d5
SHA11e01b2fda440254db1a43179c206f974b9d130a9
SHA256c90487817ef64f9e9fd56cc841a6460176d38df34e8e25a130b62540f062521d
SHA512cdb4344ac6253f276e8935d0058c6ca3b2fcd6a2ee1cca6abd19f269000d8d855214ccf025b1b90311d2729c0a4e00a97fc15a9ab0e8b7cf54d4878d0c308584