Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 11:13
Behavioral task
behavioral1
Sample
e4a36763c560bd248dee9cd0323f48224363f535f558424bdf7f40cf908db5c5N.exe
Resource
win7-20240903-en
General
-
Target
e4a36763c560bd248dee9cd0323f48224363f535f558424bdf7f40cf908db5c5N.exe
-
Size
236KB
-
MD5
d87a0a477422521e8ff065a005495220
-
SHA1
59d007bf9bd381e953103e63781f289ad5d97291
-
SHA256
e4a36763c560bd248dee9cd0323f48224363f535f558424bdf7f40cf908db5c5
-
SHA512
c94f54df7ecf9e2a70eb9ac1d003a4c38e9a770ee475609880ac7866e5f46982dd029bddd1b0aaaa10759ed90e094de7520a61b3c8b87dbba3f09cf7d51723d7
-
SSDEEP
3072:8J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/V/FnncroP9:AwDeM7iNEkgiOb31k1ECxJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2252-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2252-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0004000000022efc-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4a36763c560bd248dee9cd0323f48224363f535f558424bdf7f40cf908db5c5N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD51fdd73ea5717d1917d32d321b4345a8b
SHA13c2a793dc42ee5ddaf0c160b15886054f0ff4e8d
SHA256505fc8162564f2e465e2561fcd1a6f7566a7a9863cc227b20c6b8f67330135c0
SHA5124a604ecbd708a5c1f50772834e4a6059e84134871934603a5375ac0e6a54f52649e2e46e6c28799fe1e38802d43be40e2d6fc5d324bfd2a2ce44aab535ef9d5a