Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 04:21
Behavioral task
behavioral1
Sample
17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354N.exe
Resource
win7-20240903-en
General
-
Target
17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354N.exe
-
Size
236KB
-
MD5
afd1547d8ba414f179425c6682c08d00
-
SHA1
a1a9816cf44af700bb05e94878526b1a87abbc8e
-
SHA256
17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354
-
SHA512
979a05081dd7e9234bca25322e3db56ebb6efae19718b4015beeacc0fdfae1af0fc1fb1b00f2774e39a897fdbbea5874894dca9b035b0118f7e8986457c38672
-
SSDEEP
3072:4J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/u/FnncroP9:8wDeM7iNEkgiOb31k1ECAJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4404-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4404-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023448-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17e7081243a9a565ad539667f1d5076dcbeb81bbd0d0e630cb521a3e1c810354N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD50d29a3a6462b4ba336319dd755d26838
SHA1b7a591bd1d57114ad0560b73522aeda4c1d4690a
SHA2564d14fcff93e71ab24e573845cde74bca2856c970191bc6be25bbf4c320571b65
SHA512ecabc02017c4e4045367464aa59f7627cb2f567fbc175072c42a882fcdbb61ba0f197f53ca287b89852aa39ae411fc362b4278ab5706df38e6dfa21bf9a9f763