Analysis
-
max time kernel
99s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 21:03
Behavioral task
behavioral1
Sample
b1388acde97f7e3f8826263033d3fa714637063cffacd7d36453b8a583d8836dN.exe
Resource
win7-20240903-en
General
-
Target
b1388acde97f7e3f8826263033d3fa714637063cffacd7d36453b8a583d8836dN.exe
-
Size
236KB
-
MD5
fda047b42a57ba3a8267b116835ce510
-
SHA1
151f68e6022390e32fc64e5b75ab66463023b824
-
SHA256
b1388acde97f7e3f8826263033d3fa714637063cffacd7d36453b8a583d8836d
-
SHA512
0ff79590dc19c52296364d20e9d445e5d8a154d54034ab028b6c1816de6a9e560419d0dda20eb02e7ae6d83bfc5bbd41e15b7a5cecae80edef5b8fdf91d6f756
-
SSDEEP
3072:8J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/V/FnncroP9:AwDeM7iNEkgiOb31k1ECxJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1492-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1492-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000b000000023b9e-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1388acde97f7e3f8826263033d3fa714637063cffacd7d36453b8a583d8836dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5e7628e76ce49888adfa57905ee56b2af
SHA174f990075be1e3ad4ef2a7101988224435fb0e6f
SHA256aa717639b165765060691861901b13fe18faded723c9560b70a551505eabc272
SHA512520c7191c8453097d64865ed949e454037ef51045e2c75a14ac67888577198d7af40df1ae3572fdcb6b4c8e2881185fce79376c566895322457c4d907c2bcd87