Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 23:57
Behavioral task
behavioral1
Sample
432e29d99ec2f4a6decaebf4b6e5aa1d104710a27dac0bfaf8cc21e6bbd2d1b8N.exe
Resource
win7-20240708-en
General
-
Target
432e29d99ec2f4a6decaebf4b6e5aa1d104710a27dac0bfaf8cc21e6bbd2d1b8N.exe
-
Size
83KB
-
MD5
9e437d31d94e4abee8dc5291a28fe6a0
-
SHA1
c0bda8c7efbc6cce9f7bb339855b5e3ebf1da81c
-
SHA256
432e29d99ec2f4a6decaebf4b6e5aa1d104710a27dac0bfaf8cc21e6bbd2d1b8
-
SHA512
f77c297ffea85a4d0af6bb3800b5ce3f87cff01eb54e0bb9627ecced19bfce1bb69310b9697b09b6234140e144f9ffc6b6b9ac881fa3a842fe33b80d7c3f5a64
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+xK:LJ0TAz6Mte4A+aaZx8EnCGVux
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/928-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b49-11.dat upx behavioral2/memory/928-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/928-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 432e29d99ec2f4a6decaebf4b6e5aa1d104710a27dac0bfaf8cc21e6bbd2d1b8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5775ee26d737a0679909bca1d27460592
SHA16abc126cf18159f8ead6ecc5fb7a49583bb460c4
SHA25605f3e81999b75c913c332dced623917001bae437951c17220c61ee9b6745a49a
SHA512922d15af5c9839a95db137418e4d9409b9c298fe46be9fafb1303cd5a2c6e7b23287237d68d5bf55bda9cdeb2393dbb3e0263c65f1f97e23bf1bf5218e1f0ede