Analysis
-
max time kernel
111s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 09:01
Behavioral task
behavioral1
Sample
d9623d10cb303f446d3ca9f91a53a95232bbf925f4659d128a55df07bf9ac107N.exe
Resource
win7-20240903-en
General
-
Target
d9623d10cb303f446d3ca9f91a53a95232bbf925f4659d128a55df07bf9ac107N.exe
-
Size
83KB
-
MD5
9dec532f668fbd94bf311acf67c5ee70
-
SHA1
33f73c117430d9e371fd2524b83565431ee4f087
-
SHA256
d9623d10cb303f446d3ca9f91a53a95232bbf925f4659d128a55df07bf9ac107
-
SHA512
db49a42450443c3797a12b447b229d09219c4bccf0d056ad6be4b4f9ed21c74e0a6330cfeabc953030e0bb3c5db71ba8950a03502fb83d7c7e9729a782154e39
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000d000000023a67-11.dat upx behavioral2/memory/4856-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9623d10cb303f446d3ca9f91a53a95232bbf925f4659d128a55df07bf9ac107N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD584d685e8457cce30d7f6f4cc8b5486f0
SHA1a0c716fc35ebbad63ede3ed347d4b97adce957c3
SHA2561e22dcb3bb9ae72a1960944fa53f6367d85be40b48ef7e070b4a3522b15707af
SHA51224a2f8b5e909ba93f8806d83539b6ec8871b6af4d66992edbec0dc823dcaeae624e95d4dd4f62d813024292c5a93f576c41cdbf192261239fe5e78d007101f57