Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 03:14
Behavioral task
behavioral1
Sample
35d8608832e3593e7a2f453c4e495a34e3feb3ed4e600067aa9cba3fbbe426a4N.exe
Resource
win7-20240903-en
General
-
Target
35d8608832e3593e7a2f453c4e495a34e3feb3ed4e600067aa9cba3fbbe426a4N.exe
-
Size
236KB
-
MD5
fc3accf2ba0dca0e0ec186fb50561ed0
-
SHA1
117861df10cee50e5cb15d72fc63134723579fce
-
SHA256
35d8608832e3593e7a2f453c4e495a34e3feb3ed4e600067aa9cba3fbbe426a4
-
SHA512
0ea3b8115d0399d61fbeaaa6780d4faabdaec5782d0ec1ea50aa75821c3cc82d4edfe4ff2c3f4b1149eed6db4320013994d1f652610dfbd96d4c3187c71dd76e
-
SSDEEP
3072:1J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/9/FnncroP9:/wDeM7iNEkgiOb31k1ECpJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/384-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/384-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0013000000023a11-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35d8608832e3593e7a2f453c4e495a34e3feb3ed4e600067aa9cba3fbbe426a4N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD519397df10fc69b45e839bf276a1fde4b
SHA1c5ed434729fb0ffb62daf83356f3e34318faf9ff
SHA256c230dbd3bef72ebf19a565a048d6c2f0b833822bf18b90169bd258de7ad10d35
SHA5127cae2183806386f8c46a53eb185245cf614c3d5543076fcb11b6971be7fff35ec9685df0cc71870807cf5d0037ac1c5ce59a7accd82ab902fbbf44ae73b50445