Analysis
-
max time kernel
111s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 10:12
Behavioral task
behavioral1
Sample
0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257N.exe
Resource
win7-20241010-en
General
-
Target
0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257N.exe
-
Size
83KB
-
MD5
a7ba73b04a1246f0e1a09cfc032d1580
-
SHA1
a351646e2bdabd44181e73f2d8916d8f215d9308
-
SHA256
0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257
-
SHA512
bee038c570ce52f68820ca334bf6443f6678b2864e5675e64caaa74b015dfd0a3d69bc7b1ba8e6782a9cc96f185098a6760fc325805f18abd897421726ddf2a0
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4800-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0013000000023a62-11.dat upx behavioral2/memory/4800-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0247b735c1d2706ec2ede2389f9b46b046d79d40dc01776d73084e2a0355c257N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD55d90104efe7dfd0cc4599789213ef535
SHA12fc118081ed72c10eae9b5832209b0909a0284b0
SHA2562d6fa97c32246b76fe55389d8e84b9afa57469717f5881438a3dc53f1d8dbb58
SHA51201385fecf1e9ba53ed261de072b6c5cf2245f2cbc9b6860bdf835526b5206115f9d2e1d93c3e4f45217d4af27a0f37d637987a4000750e06fde54111531731f3