Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 03:37
Behavioral task
behavioral1
Sample
d1bc11cdab0766511f568c71536de2779fed8abd91bc047fed709cdb8c85458bN.exe
Resource
win7-20240704-en
General
-
Target
d1bc11cdab0766511f568c71536de2779fed8abd91bc047fed709cdb8c85458bN.exe
-
Size
236KB
-
MD5
7c8b8f89c54cee1d4aa7360ac23ddda0
-
SHA1
4cd70252a7c0abc8dc8f6e999dcf3cd45ddd4b59
-
SHA256
d1bc11cdab0766511f568c71536de2779fed8abd91bc047fed709cdb8c85458b
-
SHA512
6a97070a2c0b80c215930405c00e947f3b9eff55d90b3d6278ae8b9d1592820c70308fe270732602e9b568a5e24e4dbfd27caac35a3b8fde381ec0d07109f3b0
-
SSDEEP
3072:TJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/C/FnncroP9:VwDeM7iNEkgiOb31k1ECEJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4880-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4880-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x00080000000234d5-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1bc11cdab0766511f568c71536de2779fed8abd91bc047fed709cdb8c85458bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5cbb07337c21c89e1ec0141434e020a31
SHA1abe93b16b170122bc276e75be5fb8339fc58598f
SHA256abf529e7114358b024042411f1e4f3c1a02a7345a2d57fd6acd9640038d3c6a0
SHA51239f283ccc7dd4e19a4c9b95de68ceb7db68b24e88991d8b1ed5bef60224e720ec5ab54a5ace32edcee55c290a5159abc65edfca7e4fd8ea4bdda092645ebf77c