Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 11:23
Behavioral task
behavioral1
Sample
5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936N.exe
Resource
win7-20240708-en
General
-
Target
5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936N.exe
-
Size
83KB
-
MD5
87eff000526148ee9e4dee47f0008ac0
-
SHA1
66fe55dd035d8ffc8ee19715a7d70b9ece9e14a3
-
SHA256
5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936
-
SHA512
87b91f5ecd6fb71e5f8de75f95f81fede17fe2405cc7af573097a19ca946f759c0866e7d8a4a15714472c53f09a4925fdf127f29c9c18df31e5132a79db67d23
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+FK:LJ0TAz6Mte4A+aaZx8EnCGVuF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1436-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1436-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1436-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1436-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b01-12.dat upx behavioral2/memory/1436-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1436-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f6e97e71d6288189a00f73f3947b6367a59c7ec2054060863018f40dbc76936N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD580d5c91c101f0f367cd7ff1afbe85da9
SHA1b8e8dedd74801eef277dee725ccdccbe9838b564
SHA2563e027db6efefa4da2cc2ab146d94886d830a91ff505af90719b56dc192b03610
SHA512d5865e5dab639d5890cdaf1e27c85e1ffa580ff539ac1b40e417cb02c27a99934a64e60db70cbd73adcb025a21bf3a08d20ea490c7e6d1567cb90e8293e7b0c2