Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 13:44
Behavioral task
behavioral1
Sample
5f609c6d7ee831ab1fbbb642dcc4c22111d96738a3953903830c75d98817262cN.exe
Resource
win7-20241010-en
General
-
Target
5f609c6d7ee831ab1fbbb642dcc4c22111d96738a3953903830c75d98817262cN.exe
-
Size
83KB
-
MD5
8eaab039e827b30478a929c0b8360050
-
SHA1
75bbd7c6d5435858d417bff9e2caa88ee833560f
-
SHA256
5f609c6d7ee831ab1fbbb642dcc4c22111d96738a3953903830c75d98817262c
-
SHA512
ddf5d07c6ca0e4de51fe70d90ce82906bd51229390055914f53108154b8e23c2ca59f204b5e6278d55b1769b078d9d83ce42c58a113f851730b89b03338d9c20
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3028-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3028-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3028-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0011000000023a97-12.dat upx behavioral2/memory/3028-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3028-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f609c6d7ee831ab1fbbb642dcc4c22111d96738a3953903830c75d98817262cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5413c715a620d6014a324deb8ba4e163f
SHA1ad6386bacbba56653b3e05260f45f7b551345340
SHA2564f67827f6ade5455437dcd4d7c6c7be4a890e41096604ecf8161b3077812a789
SHA5120eaa7b17a0b2faf54c81d6dda328f10570fef980f486f486589589b066f659ed4505bdbfc6557884a75ce8b10e834422947783529e07aa7074529e51e0636ce4