Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:26
Behavioral task
behavioral1
Sample
b949a6e43310e20f3bbbdd32468e5aeb441b72222f453764d4d45d4e3a43aecbN.exe
Resource
win7-20240903-en
General
-
Target
b949a6e43310e20f3bbbdd32468e5aeb441b72222f453764d4d45d4e3a43aecbN.exe
-
Size
83KB
-
MD5
7a3b8ab1bb8e303a22670b7fba54ac30
-
SHA1
feb5676636b7973df90ebae30ad2796bebb6c8cd
-
SHA256
b949a6e43310e20f3bbbdd32468e5aeb441b72222f453764d4d45d4e3a43aecb
-
SHA512
134032fac4f51a9d9a49c8943ad351dbd8b53cad03e8e5e2de3a4e687850037ec84aa45805aaae02af21652eb9682da807d2804891ee4eaaae07b50e9b3c285e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BK:LJ0TAz6Mte4A+aaZx8EnCGVuB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4576-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4576-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4576-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4576-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0012000000023b80-12.dat upx behavioral2/memory/4576-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4576-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b949a6e43310e20f3bbbdd32468e5aeb441b72222f453764d4d45d4e3a43aecbN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5227dd1dd262c42270147a477e94d4c71
SHA1090017386b98f3991ad86ea13ba762ecfbba4ecd
SHA2568ffef0495407c885e955803fc60b2a512724364b8d939c43becc988689b112b9
SHA512284a3f5f52397a785be607947cac39a263f3c04f33fbd99d8e25bf74a31fa2c484f1a97bf8777e26e0e45a698291b7b45f3fda539ceaa01d5181aa89a5765133