Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 14:22
Behavioral task
behavioral1
Sample
98cb1314145aa1d5a72d3a22a6eae8d958a92f7267105978288cffddf08c9a96N.exe
Resource
win7-20240708-en
General
-
Target
98cb1314145aa1d5a72d3a22a6eae8d958a92f7267105978288cffddf08c9a96N.exe
-
Size
83KB
-
MD5
380c6c387dfe13b50b2fbefa21f3d5e0
-
SHA1
df97d4a2a20f46cea77228d1f992e5930a047b0f
-
SHA256
98cb1314145aa1d5a72d3a22a6eae8d958a92f7267105978288cffddf08c9a96
-
SHA512
484f021ecbe05fb832711855236f749186df1e57db548e29d200a4fa61f4dfb6a8b18568f9f57fcaef37ad63b2660fe7a5a0a0104d5d776eb95eb73b0a983d31
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2732-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2732-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2732-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2732-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0014000000023a0c-12.dat upx behavioral2/memory/2732-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2732-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98cb1314145aa1d5a72d3a22a6eae8d958a92f7267105978288cffddf08c9a96N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD556845cbec65ff33f7fb293d47b28fb6f
SHA186f04e23452cbc73ba230cffab9c9bc1d9ee4d5d
SHA256051bbbc52a7b0a82a9de040fe6d9ccdeca0746677f9348d56a725329dd83ddc5
SHA5121047e36a723bf7afb534c1035b78a58739c47e9ed7e20bbac519c713557bbc4d06452f55afba32acfff71910dc87c47cf3688375dbcf4aab3a521f9b4a11f81a