Analysis
-
max time kernel
111s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 16:04
Behavioral task
behavioral1
Sample
f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe
Resource
win7-20240729-en
General
-
Target
f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe
-
Size
83KB
-
MD5
c952deffc67c2d0d6edf6ee1afea7d50
-
SHA1
624ae0d64cadcb641f47d6c7d89baeb469f96e9f
-
SHA256
f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0d
-
SHA512
42b76cc3ea296ba3d575de53f60dde860ba323c093aca59685221f119e161caa749c2309962d122a40d6213506f6726826b13bcfbcfdd487996db8407dd96410
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+IK:LJ0TAz6Mte4A+aaZx8EnCGVuI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3312-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3312-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3312-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3312-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0012000000023b56-11.dat upx behavioral2/memory/3312-12-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f580affd2e2025f25e78876814b94351454b3a5ec2ed4c72f71d41ab43eecd0dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5c6266b73bdda1a4dc979ea947808dbac
SHA147df106edf0d6813f1e5a1097d100b99285e7420
SHA2561b2e6cd8a8f53306614653bcc95937c9931886363065e571e5d4bb42e5f9b16a
SHA512f51e5f541cd2eff3f8f15f61c3d0dc4836a1bf5ba99be48e8c00401efd02bd01456c7509c664521252365e96509ffa60065666db4e27aed644015dcd937356c8