Analysis
-
max time kernel
111s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 20:08
Behavioral task
behavioral1
Sample
298bd05ed4fcc175e430a73865febd9ddcbc76ca616598fa70a73c05380e241aN.exe
Resource
win7-20240704-en
General
-
Target
298bd05ed4fcc175e430a73865febd9ddcbc76ca616598fa70a73c05380e241aN.exe
-
Size
83KB
-
MD5
84f674b6bb09cd2b0332112ba40dd290
-
SHA1
98c4990bb76d04e17fda28905f83489289230892
-
SHA256
298bd05ed4fcc175e430a73865febd9ddcbc76ca616598fa70a73c05380e241a
-
SHA512
d60f676af6ccbac93e9bb0b30dd41f22419fdbbf3cc99c8c4de862a93948a5582488fcb372f8e73946b1c8732497250bebbbde73f8bafcd63d531a0968a9ebff
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1856-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1856-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1856-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023457-11.dat upx behavioral2/memory/1856-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1856-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298bd05ed4fcc175e430a73865febd9ddcbc76ca616598fa70a73c05380e241aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cbb98ecb4e0017a16d332b6ac56bab40
SHA1fda365d6495d172362c6c19012fe8d309f6935eb
SHA256db299bc2bae410a290654cb73b8125f2a07cc858607946cfeedd23df293bd6c6
SHA5121476f90457e93bb5dfd0522c0f08a7d5e977bbd058a02e1c01e05ab4f4e8bebeaf3b5a2e1167bd469a97709b33e6ade90ff4baa5e1c986495784832285f81541