Analysis
-
max time kernel
110s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:00
Behavioral task
behavioral1
Sample
a021dcfab4c8deb67200fa99b55ed28d300227c3f043566bc6934271d247907eN.exe
Resource
win7-20240903-en
General
-
Target
a021dcfab4c8deb67200fa99b55ed28d300227c3f043566bc6934271d247907eN.exe
-
Size
83KB
-
MD5
1f7e93060a98b2f3e66d3dda18645f20
-
SHA1
e115289575b4b61e2d7356ce94f2465b958e4d79
-
SHA256
a021dcfab4c8deb67200fa99b55ed28d300227c3f043566bc6934271d247907e
-
SHA512
2c9ea205e99dbd269216815cb02a88163ec3305f1237b67a18069b2b5aa3ad949852a43a0ad6c2924178255123fa91fc8e3ea4d04f29bd9008f1afa8548c9b56
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK:LJ0TAz6Mte4A+aaZx8EnCGVud
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3056-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3056-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3056-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3056-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00120000000239d2-12.dat upx behavioral2/memory/3056-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3056-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a021dcfab4c8deb67200fa99b55ed28d300227c3f043566bc6934271d247907eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD54e4ae574704e9920e4c7246138c5026d
SHA1381e0df6ca66c1d5b8d83146f9b09915d52e1079
SHA256646f07ab58411ea73f8fc56b3f2c9559dfa86b338730ea71719d978f5409ddc0
SHA5125d9fd538b25caa9cdb02ecf2985bbbd93befee636661e05e79a1c5e75bfbd03fa2d048b763c8fe9fe35f15590cd923a9913203af6e64c179498cdf73f5df075e