Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 07:19
Behavioral task
behavioral1
Sample
87e2c84e944854f1092ec203f21482bb41907c5001f224eabb0bfc2e6e79cee7N.exe
Resource
win7-20240704-en
General
-
Target
87e2c84e944854f1092ec203f21482bb41907c5001f224eabb0bfc2e6e79cee7N.exe
-
Size
236KB
-
MD5
7bd98fe8edba634bd2047f4a8dbab2d0
-
SHA1
67538590a6705215914846e3ace1597da7b7d4a3
-
SHA256
87e2c84e944854f1092ec203f21482bb41907c5001f224eabb0bfc2e6e79cee7
-
SHA512
0da39c5e5ac60b02c85a3168e811db8ae341ae84f6a18661d8b9da9aaeb4c725796ec3fa084d24091dcb208a85783be043f3c4e2f5ae5fe09bee1f8c862d6f1f
-
SSDEEP
3072:gJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/h/FnncroP9:EwDeM7iNEkgiOb31k1ECtJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2632-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2632-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000300000001e748-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87e2c84e944854f1092ec203f21482bb41907c5001f224eabb0bfc2e6e79cee7N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD513c35c02ee24f417f973192645f199a1
SHA145720354b960a7a06f165b2442089d65c27349c8
SHA256f98f8765026ef26bbfccb4ebb13c124eb069175e207dc5e63a0c1357f2075cb4
SHA51273007b197e9520944f328de0d007b45db06a3b9a7c34f91611685f35e637fbfcb83fa2d89cc87bf574a95c05045ccbc5eedaeafa7b83e5140cd51b22ec13928d