Analysis
-
max time kernel
110s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 00:54
Behavioral task
behavioral1
Sample
eb99d7d35b99beddc3c5a5390bac6752f62af840dcfa245607f8ed13426c87b2N.exe
Resource
win7-20240903-en
General
-
Target
eb99d7d35b99beddc3c5a5390bac6752f62af840dcfa245607f8ed13426c87b2N.exe
-
Size
83KB
-
MD5
3aa6dc2f99e94f4a853d0debf251f2b0
-
SHA1
1a5bd5fbbc227c87526a1ff8b453f61a98780236
-
SHA256
eb99d7d35b99beddc3c5a5390bac6752f62af840dcfa245607f8ed13426c87b2
-
SHA512
abc568c33e36c8045449d03da6f3faca36eab45c49608030e416474e007c4168ade6a9a8e9ce3ae4806b787387723256678f4715b967c6e8c9e7090cd9128b02
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2692-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000d000000023b50-12.dat upx behavioral2/memory/2692-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb99d7d35b99beddc3c5a5390bac6752f62af840dcfa245607f8ed13426c87b2N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bdfdec7b7a7525749632708ff20eeb92
SHA1ecffd8dda591c16065f8c67442ba57917f929a3e
SHA256ade9639062dbddec7f95bd435d3198a88ed244f1c6caaedeb4323e8528f7dde5
SHA5129bfd397ca62a5ad651c2f503c9040880fa2544b127a7fe9761116553e305c211bd2cd19f1eb0cc3c8e55a4d0c8a7690801e933dd78bdf61bec8c0a92b932362a