Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 00:42
Behavioral task
behavioral1
Sample
ab345969abaf90bc523c0182dd1c64f89a1ab6ffdc85500b643c625f0917be1dN.exe
Resource
win7-20240903-en
General
-
Target
ab345969abaf90bc523c0182dd1c64f89a1ab6ffdc85500b643c625f0917be1dN.exe
-
Size
83KB
-
MD5
eeea4c54fd60606746c8ee356cc53390
-
SHA1
8b2ef4d036d42b93dd5e136eeccbfce2ab076c05
-
SHA256
ab345969abaf90bc523c0182dd1c64f89a1ab6ffdc85500b643c625f0917be1d
-
SHA512
d29c5b8072edfdeb4428482ad2d701830ef6a1a378d20ee271679f7216ff81445aa7ce9136f0d817360fa99771042efbf4bb6c56966f303ffc2cf9e8cda3e659
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2816-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234e0-11.dat upx behavioral2/memory/2816-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab345969abaf90bc523c0182dd1c64f89a1ab6ffdc85500b643c625f0917be1dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5ebdf8fa8ef247de213b218613c714ab9
SHA11a2991c06602a955eff9afcb511ea1a9b5232d05
SHA2560f1582cceb89b1e1deb7637c4a3e340d4e78a575262ed45525a2a3deab83b98e
SHA51234663a181860f294c2c4f4a103ff2d99530a3ceba56753399cde8c8739954747b51f536f919e909e00686d1e34bb3522020308777885def310a991db5e01b8e1