Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 14:46
Behavioral task
behavioral1
Sample
31599ffa4d75c39385e410544af9b86e29cf12129a671376f906dfad5ff424dbN.exe
Resource
win7-20240729-en
General
-
Target
31599ffa4d75c39385e410544af9b86e29cf12129a671376f906dfad5ff424dbN.exe
-
Size
83KB
-
MD5
789451ee9fa3b81e52e852591362a300
-
SHA1
5db8dedb1890cb2a5d3ec8150352249cd5d3cb22
-
SHA256
31599ffa4d75c39385e410544af9b86e29cf12129a671376f906dfad5ff424db
-
SHA512
c506b5f3c618b971c77f8f8942bf3f56fe0f36bcd4fdf47033f4ab7a9495bfa601052633d87c4c383bbf7772d199e8be295fc9210f1496e27620650c6f7e8161
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK:LJ0TAz6Mte4A+aaZx8EnCGVuU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/448-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/448-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/448-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000800000002344a-11.dat upx behavioral2/memory/448-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/448-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/448-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31599ffa4d75c39385e410544af9b86e29cf12129a671376f906dfad5ff424dbN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5e4486a6125b6ea3b3fcd7e7ce83e269b
SHA13d3a1efdd09622945df26ae7e62858167ccb69f7
SHA256157889ca4ca83230608a4b7deaca2eccecde7516c75f4b4dcc501803490b28af
SHA5127f2ebe52054d09a55f1c03c45bee1d69b6c9fe11258a26ba764eda436bd296a03816e7f3a8ac6085819d9b5a11aecded6c16eae689f2285c9109be55aa0df00b