Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 04:27
Behavioral task
behavioral1
Sample
1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe
Resource
win7-20240704-en
General
-
Target
1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe
-
Size
236KB
-
MD5
31d8ae4630c67bdc44dd67473e5d6da0
-
SHA1
5a8cb4e3900beb1a57d844ed231ce8a91c33bf28
-
SHA256
1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870d
-
SHA512
8826d5f6b278d9e075b4119bc2eb02e8c01068e4153813dbaa192ca173c442a8475b8a0ecf31ed0b56aa4e72bce07faf119a1e491dda91c3fb61d2fc4b8e92e3
-
SSDEEP
3072:QJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/f/FnncroP9:0wDeM7iNEkgiOb31k1EC/J/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2920-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2920-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x00080000000234ce-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d3c9760da24e2d0de4db0e4f919f010e84316130615085f0e140ac87033870dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD54fc1674e6b07aa0dc6851d5a38acc5e7
SHA132df4bf1f3d102628a90616fe74e0aced5cd3455
SHA2569f06a0108bfab8dd03ae29894b06a06bb047321cf79356f3a98c28fd4d405273
SHA512c51591e14c5eafa9732049d9824f514db5820246f7d8661b356a63db68fdf1cda5eb6c58f756b15656427aebb529ea8e19bd261ad5c2ffb30ed9b2a55f9420f4