Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 21:05
Behavioral task
behavioral1
Sample
44d331447474c3ae2e7b506afa6aad298479006386ee458aab70cc4d15e032b8N.exe
Resource
win7-20240903-en
General
-
Target
44d331447474c3ae2e7b506afa6aad298479006386ee458aab70cc4d15e032b8N.exe
-
Size
83KB
-
MD5
8d28ef35bda458c1d87e4dacff103e40
-
SHA1
16aaa39897bc0c7cb7a1adef5c3487aaef36367c
-
SHA256
44d331447474c3ae2e7b506afa6aad298479006386ee458aab70cc4d15e032b8
-
SHA512
25ccaf817a6b737ab94c89fb451fc4f9116ff9093dad623cb01a70fe6b6bc2172b6d75e02807da13c5c06ab859966d73b871ade170da7f9e66fcad19ddc6f3f1
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4944-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000200000001e389-11.dat upx behavioral2/memory/4944-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4944-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44d331447474c3ae2e7b506afa6aad298479006386ee458aab70cc4d15e032b8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5dd2d06b449f169a6d8ea45e2e4e57748
SHA17ee740f0f8b80989790199db2f115236f1ffa287
SHA256341f665a81022a846518feec5bea662e417fb51fed80c01398c6b64ab5ce5553
SHA512370161c6fccd619c03d3b234667e8449c3b2f4a873150cb126c50c6d2282bf5e1233ea2e9c183024d87dbf8d1351f153b2cda248ab20176f37d29b3906502bc7