Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 14:11
Behavioral task
behavioral1
Sample
0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2N.exe
Resource
win7-20240903-en
General
-
Target
0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2N.exe
-
Size
83KB
-
MD5
9530188ea4f3f18466f406fe7fcfa180
-
SHA1
e31a968682d0f6af7bd7762df243ca83ed79f8b0
-
SHA256
0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2
-
SHA512
89fea46df677916da8c8723d870b1f6c3f445268b76d869f6b4da7a6ff126a9feab1fdc0029a4193be3cd6c9958434c2e16f7d805aa2f61d4fe5fc507d321c6f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3852-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3852-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3852-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3852-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c80-12.dat upx behavioral2/memory/3852-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3852-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0272e6aaa7fbfe5e584338a4baaa6e052558dea4397a5e31037923daa1f876f2N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5c1fa309a588ee20ad7bca76c182a83fa
SHA107bc573c912d45ba3db9e02b052efe6ecaf39442
SHA2562d92d2642245bf1a1ae49ca4b2c4e1d61b59e12f2ee5fe595243f225604e15bf
SHA51290692e347e983acc23c7127528e94b0c9d32d6298f3d8a2791a2efa3ea6f3b837c99943f91492c730d597ed83803f6bf91f4e96fe6b08d369304504157dc9c6c