Analysis
-
max time kernel
110s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 14:28
Behavioral task
behavioral1
Sample
0ba3c209dee650d29c1ab516500b0b2e8c746950ce60835cff6be028d9b5515aN.exe
Resource
win7-20240708-en
General
-
Target
0ba3c209dee650d29c1ab516500b0b2e8c746950ce60835cff6be028d9b5515aN.exe
-
Size
83KB
-
MD5
314f6d5c78f41cac4ffad0349b29e640
-
SHA1
c3eecbd990c3213038bd12d5ab48ac04c48df676
-
SHA256
0ba3c209dee650d29c1ab516500b0b2e8c746950ce60835cff6be028d9b5515a
-
SHA512
c9371308ec2107e77d53733364c200d50ccd2783a6e0e18e09a854ae73d161f0c4e3534a5035654fe7a8e8dfe1c173995d87830acff8e1281c2904496a389adb
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/224-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/224-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/224-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/224-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0011000000023adb-11.dat upx behavioral2/memory/224-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/224-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ba3c209dee650d29c1ab516500b0b2e8c746950ce60835cff6be028d9b5515aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f2074acb2fc3735734becdd28b18e0e4
SHA1acc9300227afdeddf2900b90e47637d93121a342
SHA256ce27bdba4cd874a557ebe1a5bf842bb8b582e4030804f5c84cd33084b8cddf2a
SHA5127869f44c3c1c317c8f498e16692d6f868a6e54029d5ad5bb5866ea098a7d031da1fe5c267145c3089ddb06ab7038b42cda18dc4f6b57f317abdf12bb3edfd556