Analysis
-
max time kernel
111s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 03:23
Behavioral task
behavioral1
Sample
314d70aabd80abc033f84a81a60cb246e04435acdf90c5c7e9cfe61530aea3a4N.exe
Resource
win7-20241010-en
General
-
Target
314d70aabd80abc033f84a81a60cb246e04435acdf90c5c7e9cfe61530aea3a4N.exe
-
Size
83KB
-
MD5
a83e8e2158f2489278aaf17690166f80
-
SHA1
2ec2e64dd46ab5b3926d8732ee5f3ec8e24fc28b
-
SHA256
314d70aabd80abc033f84a81a60cb246e04435acdf90c5c7e9cfe61530aea3a4
-
SHA512
816542b040a1badabbee1bc540266d8557603495d045efb863bd5879c43755029be2b2405f5dced6c35afd52c59a14eb231ef9378e3a61fbe39f74124fca242d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2872-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0011000000023b5c-12.dat upx behavioral2/memory/2872-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 314d70aabd80abc033f84a81a60cb246e04435acdf90c5c7e9cfe61530aea3a4N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD501645094790d56fa380531ae392fe941
SHA1e854c839387d47b7c1a5e8d084f456be876a3190
SHA25678ee5aceac1e5502a1ef6f984254abd15a4f607bfbd1eff2bc78fe5d45039273
SHA5129f43c22b7cdc53bdfbe7ff2ae18dcdd6f79a49cecd5476fb932029e4f45c99d10fa590e3540ede2c5070d7438a5771e61b1cd52745a9b58619e24a6cb57eb768