Analysis
-
max time kernel
110s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 02:27
Behavioral task
behavioral1
Sample
60accfd86576fab584123b2bc9c73965838cc6eaa90db4c142717ffc26618a9cN.exe
Resource
win7-20240903-en
General
-
Target
60accfd86576fab584123b2bc9c73965838cc6eaa90db4c142717ffc26618a9cN.exe
-
Size
83KB
-
MD5
a2a2df2129660fa0b595c54a1b158d00
-
SHA1
34cc730daaa183ab455f83fe04b02e23a21ffd17
-
SHA256
60accfd86576fab584123b2bc9c73965838cc6eaa90db4c142717ffc26618a9c
-
SHA512
e42b67fb41d70f9be2966c51d54c431212c3dbf8b1b2747c6ec2f434bff92472d70d71d4d03a9b51154d05e56a835e1358810ae1f0530c551c35836373d17f8b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4764-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4764-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4764-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00080000000234f6-12.dat upx behavioral2/memory/4764-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4764-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60accfd86576fab584123b2bc9c73965838cc6eaa90db4c142717ffc26618a9cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cd0b3405ce538f0f4a4e08ffdcce03ce
SHA118e67b697081562207d03fa6b944755f9a47505f
SHA256a9861b90fa19e3b25e362839260d295ddafec2a6860027728becf72e927dc6e5
SHA51237474bc3cd4c6eb21cb7f13ea67f027e4430404d76e656d51ad117e06bded8433bbe79f277bb0d69cde0b7b40faa1ef668c5c136c03934f82e690c9179b391a7