Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 13:59
Behavioral task
behavioral1
Sample
f0ede8d9b55948519c690aa356a89a46e384137c5b5c13c86cc61f043cf8dd39.exe
Resource
win7-20241010-en
General
-
Target
f0ede8d9b55948519c690aa356a89a46e384137c5b5c13c86cc61f043cf8dd39.exe
-
Size
83KB
-
MD5
88156d9eb59221dd98cc834d1a6e0de0
-
SHA1
1e555730262b928a1899ac0238a87f4712080cc2
-
SHA256
f0ede8d9b55948519c690aa356a89a46e384137c5b5c13c86cc61f043cf8dd39
-
SHA512
43bafb04ff1702197f21212b93e3c26a84b5e1a41e0deff6f6a35150d59d01ef2a386e30a002490e9083d90f4cf8ebff8f74185bce194074fd312dee9acaacc6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EK:LJ0TAz6Mte4A+aaZx8EnCGVuE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1016-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0012000000023af4-11.dat upx behavioral2/memory/1016-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-28-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ede8d9b55948519c690aa356a89a46e384137c5b5c13c86cc61f043cf8dd39.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5449c7fb25c483270dfa08968da44c3fe
SHA166b15bde86bffe54d90df75922c18704e2ca74e8
SHA2564b0c171a64fbe87ee095fd5659080c5a2ac079e31641fd7371a9888925dc9649
SHA5120118893d62ddc1c7e0e2061169baa007ab44a3c2c36945825964a87d5029674dc22a11e14f742da39633d4d96293b64117caf328310b0bf8d712b4f4046c90e9