Analysis
-
max time kernel
111s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 23:35
Behavioral task
behavioral1
Sample
d256c685b24f0f1a54d5498f76070ee98c220f8f502ab3f546e86573ae4d560dN.exe
Resource
win7-20240903-en
General
-
Target
d256c685b24f0f1a54d5498f76070ee98c220f8f502ab3f546e86573ae4d560dN.exe
-
Size
83KB
-
MD5
2178d0a8b58667de3fc9942eb0cea060
-
SHA1
61f7c887bbf896198ed373816aafb04dd45ad97e
-
SHA256
d256c685b24f0f1a54d5498f76070ee98c220f8f502ab3f546e86573ae4d560d
-
SHA512
7e772df2be7d54229fc912e910b27c701e9edbb7afc91f098835bd5628ad967e15d685d5b0c66ec43371329e91eab99f8639787995f2c42601ca632087f3fcd6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+aK:LJ0TAz6Mte4A+aaZx8EnCGVua
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/228-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/228-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/228-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/228-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b59-12.dat upx behavioral2/memory/228-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/228-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d256c685b24f0f1a54d5498f76070ee98c220f8f502ab3f546e86573ae4d560dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD54be68273a89085078dfa4b21e8c947ee
SHA13877c6a4b16639dac97ee139ac366239984f86a3
SHA256c1e9a695e065939bae4767a1b41e7e1a9bd2038c125615e033409fb0b763283d
SHA512113b023a25c86ffcbdd9cc470ad93b7cb1305e03e0919a00b79b8fbb6ed62b71c11090089b115c80cd8de5ef636d4663d56f97bc78eb3d31a105c8ea7cc4ee28