Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 08:00
Behavioral task
behavioral1
Sample
47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672N.exe
Resource
win7-20240708-en
General
-
Target
47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672N.exe
-
Size
83KB
-
MD5
f03274bbcb5ee952b0cd2c43d0de5000
-
SHA1
bf06c6e5c8483e3b0d3cdfebe16569ea300d43e9
-
SHA256
47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672
-
SHA512
6a86450f587b080d0470ac1f114414cd669d04c5c61ea09671e7f891820eca4cfce2ec0221b8377cc0a1d7196fdb57ce51d5be1d2a7a7f2d35a6bf116a70bccf
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+zK:LJ0TAz6Mte4A+aaZx8EnCGVuz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1988-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0012000000023af4-11.dat upx behavioral2/memory/1988-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47199d66bf69ec121992d4f83c3bc130753c487cffa6a0fd24957feba20f6672N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50c27c67906f07ac9a786257d69c6c44f
SHA174c090404dc3ce3023ba47e78e496d107395eecd
SHA256ef0aabb3357a3d5cf1963121fe39efc8141a76a4c171d1cd1ec0b7a38c8f383d
SHA51211abf36fed5c3072e9d818950a7627030838dc32df7255e8421fadf8615ce4f959140fe76d64e6b0f8c4934d48dbe88be77d4650be454d0654041bbc114fd4b7