Analysis
-
max time kernel
111s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 22:00
Behavioral task
behavioral1
Sample
c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ceN.exe
Resource
win7-20240903-en
General
-
Target
c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ceN.exe
-
Size
83KB
-
MD5
1a347cbca9574df689ed68cbd8decc40
-
SHA1
c8ed51e4238f56a19e501a3db55c03c7459f6972
-
SHA256
c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ce
-
SHA512
893d06b44f0d9a0d31406a52cf3f29fa5f37a8a1e93016ac7b7585ab3da994988dbde9091ecbb3db24cbd4f538a623b517e4a3bc939bdcfef818f4f796d79d74
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hK:LJ0TAz6Mte4A+aaZx8EnCGVuh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3360-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000e000000023b48-12.dat upx behavioral2/memory/3360-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c61f8fd66748af18537c7198ad26087157a30789749e0f9a48dbbe017640e0ceN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD55665df53b7c730799aea2e87b69cafb2
SHA148ffadea25d19bf6aaac5f1f429a8c9d787087fe
SHA25626e95c7c6a131beeb2f1007b7d6b4b64f120e76a603ec006e1b560284332d9d8
SHA5124471989c715f2d3eeaa09d0bbefc795445a07b79003a3de66c85a100804ebbe9f2a54bd58a3f18bd65a7968ea73e49e0e54f00572d7554b98155f7686a0651e0