Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 07:33
Behavioral task
behavioral1
Sample
041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0N.exe
Resource
win7-20240903-en
General
-
Target
041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0N.exe
-
Size
83KB
-
MD5
cb98d65d43742bd4dc5c369cf0c12c10
-
SHA1
55ec560bcf32c30725847baa6e0ac59af2f3399c
-
SHA256
041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0
-
SHA512
b614d7f5c1cc6e8810ff29715ce81ef0bf80d2a16556a2f55b67dcb9193c8484dc1ba1a6b6fed9168e1a1a83b6ffdd573a3f8a59fae70efe0f04431ac8258254
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2356-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b66-12.dat upx behavioral2/memory/2356-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2356-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 041e3cd9efaac5736b528054f3e15689924c852da20c2bfbdcf5ff462499c5f0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD544e1f31eac095bedaa5274eee6ef1b26
SHA15b46bcdba95a8bc7aeb9a1060bb585e0420a7722
SHA256fba09068a3f606809f508c3e23368b6e972c460ccf2d10c0b7c5c4af028800ca
SHA5122b7f385e441a7617864bfda2f100065f39ddb44b3d3cfcdf0a9955caac7a73b24fa01d6af59621379f28734c78a0a15e92cf0f7178db9955dd5654c5bdd6c067