Analysis
-
max time kernel
110s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 15:51
Behavioral task
behavioral1
Sample
795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0N.exe
Resource
win7-20240903-en
General
-
Target
795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0N.exe
-
Size
83KB
-
MD5
75f4c1f8fad71e0b57ae822b98d46db0
-
SHA1
d50fec74c60527015b7ed4b8750f8da3453a7d84
-
SHA256
795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0
-
SHA512
a1bc432c91c0879a9a111e616f1a283c84cd5de103af511df8195b7c06b3ee97d1e6aa886cc6f4a1436e21bb82628e70c0ab1a7e0e9d68449b6e77f9d4943d00
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/696-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/696-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/696-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/696-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0032000000023b75-13.dat upx behavioral2/memory/696-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/696-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 795232e7bc8a12887c7c6d78b7e1feac5760cc9da06dc0bebd01578f75999eb0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5112ea0de5da903d83e450025e8e3b226
SHA1c10b91a984d4c8f3b1f600ddfa3b2efa31988656
SHA25618168b7483a9e44f0a413a1dd3db13b8753a594d561eb8cb656dc04dc4fdb034
SHA512054b6e5539aaefebe715b7cc2ab72b42e9e2a0a0f791dbef7a139d382b5f2dd5346264ca80eae56d0cc46a3027ead062016b7f46642909f83779f43bf7b7ca30