Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 11:37
Behavioral task
behavioral1
Sample
486dbce8f7c5d99e3f3188e746f83d40dbb9f3afc75550e9eef1224a5000ea8eN.exe
Resource
win7-20240903-en
General
-
Target
486dbce8f7c5d99e3f3188e746f83d40dbb9f3afc75550e9eef1224a5000ea8eN.exe
-
Size
83KB
-
MD5
033bb53819e6bb0b410351ecd943ec10
-
SHA1
e25e3b0d2ad647ed769e894cbc0b1b4d0b9b6201
-
SHA256
486dbce8f7c5d99e3f3188e746f83d40dbb9f3afc75550e9eef1224a5000ea8e
-
SHA512
219031b24d9338487be331c57135382f019f4dad121e71c2a9eba122e372aa977e082eb48a09728182148a985ce344e618526d94326a839c77bf2e491a76c659
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+aK:LJ0TAz6Mte4A+aaZx8EnCGVua
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1812-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1812-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1812-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1812-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023445-12.dat upx behavioral2/memory/1812-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1812-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 486dbce8f7c5d99e3f3188e746f83d40dbb9f3afc75550e9eef1224a5000ea8eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56c87d9b436ceff94d2c4c9415c2050e8
SHA1889b6015ffdcb8c819ae596db2b16db52b34bbc3
SHA25639b9b6c882923600c42e06608eadcb883f4290bea8e3743013ffb4aa5783c289
SHA5121fc81af9943f59463b429e92d353652a1c648e26eddf2622cc79f0a8e2e788d7c0fd04b72f78c8a9f77acfbbff1a5e05e5ff42698cb6606b23af82e1445e689a