Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 09:01
Behavioral task
behavioral1
Sample
45d1fc8e98f1556fea1c70078f771e54e3d89ef19fba6c7e4e6857ebd02a2339N.exe
Resource
win7-20240729-en
General
-
Target
45d1fc8e98f1556fea1c70078f771e54e3d89ef19fba6c7e4e6857ebd02a2339N.exe
-
Size
83KB
-
MD5
60b0e51d01d001130fdcf319728d5770
-
SHA1
f087118bb0181a9c848f9af93ba96446842e1246
-
SHA256
45d1fc8e98f1556fea1c70078f771e54e3d89ef19fba6c7e4e6857ebd02a2339
-
SHA512
34d9f90bb3aef661b632ca04ea7ac2548bd1c3a47d2ec507631966cb73e44f4e0d2faa21401fce862a13255de767a656fc8c62fc482eb6bc20eeb587813e78a0
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1968-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1968-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1968-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1968-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023469-11.dat upx behavioral2/memory/1968-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1968-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45d1fc8e98f1556fea1c70078f771e54e3d89ef19fba6c7e4e6857ebd02a2339N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5516931dd3012ac113d1951468d41ef16
SHA1a06516a489454424fd86c801fa9500323e0cd117
SHA256491e2c2e32d45cc0b8d57dae6790934d39b197d2f486790c5d5679fc14c10c8b
SHA512a4cdcd192850f41ef3abe1105ac02be9d23414f112c97766ad309969dff7901fd1e961d0f721f83fb7cd863918974c257e443758e2b816b5035be549d022f19d