Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 15:40
Behavioral task
behavioral1
Sample
852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cbN.exe
Resource
win7-20240903-en
General
-
Target
852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cbN.exe
-
Size
83KB
-
MD5
8b02cc12d42406cd4fe27c5d870c7ff0
-
SHA1
5ef170f5b52f6f8b437cc69ea47052ee02bfbf82
-
SHA256
852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cb
-
SHA512
e89f60586da8ef248af430fdcd7ad42889b9c444f2765339fb12cfe1101e12e2fe75eda70d8b426f4f14b0293027d420a4d4b0ffb2696de8b1cb972ad5014c55
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3612-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234f0-11.dat upx behavioral2/memory/3612-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 852b4f2edaa799c6b3eae42c09a012b644de53dba952229af561ce50a5f4e9cbN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50fc796ca3be9365ae88a2e6c10ed4a4f
SHA1fcfe471e515f8ec2f0d554719109600db192c132
SHA2566edcb1bc4308721a22a413edc48edd686bbee713f9c02bbb4b4d4640182ad013
SHA5127cca6ec7ce9e04e15c38430f02441e972797050f4b186b8690af70d4dc56419f4521b37999baee29fc2a4949075681486cdb6e1f3d2d981f0db1466741f31eec