Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 09:41
Behavioral task
behavioral1
Sample
3b000c82826a86de9688d4cf9806ee39c269d23021931e35da4e3e4db6e70f87N.exe
Resource
win7-20240903-en
General
-
Target
3b000c82826a86de9688d4cf9806ee39c269d23021931e35da4e3e4db6e70f87N.exe
-
Size
83KB
-
MD5
090a2374a1bc747bcaa8ca292b1218c0
-
SHA1
2ab26b406e58633c2555465440b9ace8490e7b60
-
SHA256
3b000c82826a86de9688d4cf9806ee39c269d23021931e35da4e3e4db6e70f87
-
SHA512
23dabcfd82194938da92beeb41590547cbbe4fe2231c1350e986fbf22022a1cfd140c84979bf6fecbfcb042b89450f76dded647a074944b8bf9e08d5f396a98a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1220-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cd9-11.dat upx behavioral2/memory/1220-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1220-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b000c82826a86de9688d4cf9806ee39c269d23021931e35da4e3e4db6e70f87N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d29d1e5f718d835656cd6043fe6b7063
SHA18fbb595c2956cb1247a1add01d2f37958a22a9d3
SHA2567c77a9e25607c1dd18d96896f00e8b61cb68a954f533b769c7253ddf2692157e
SHA512c6b887004e58965a00d744d5a8e05da934ce1e9dd908f7fd5dbcf567a85a6c07e9a19fbaddab961109e738eaee7181c5ce9ee9155a0f2934076e066fc0f70813