Analysis
-
max time kernel
111s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:03
Behavioral task
behavioral1
Sample
15770ce932f3ed9e2efe37dbc8a8f3fd8cee48c7ffa48258596985f8ba4a3232N.exe
Resource
win7-20240903-en
General
-
Target
15770ce932f3ed9e2efe37dbc8a8f3fd8cee48c7ffa48258596985f8ba4a3232N.exe
-
Size
83KB
-
MD5
198bca5480bb2efce41251931b6e5de0
-
SHA1
932132557f16ef6e7c1e732f563df31c29c5d274
-
SHA256
15770ce932f3ed9e2efe37dbc8a8f3fd8cee48c7ffa48258596985f8ba4a3232
-
SHA512
173c0c65a7ca261fc7f12f7afa21f51678e17eb0e65860436e75343e2cf286d84cfa410ead485b6b277a8371343bef27a327b7082c8cb652075e48ceff20691a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++K:LJ0TAz6Mte4A+aaZx8EnCGVu+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/212-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/212-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/212-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/212-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b9e-12.dat upx behavioral2/memory/212-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/212-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15770ce932f3ed9e2efe37dbc8a8f3fd8cee48c7ffa48258596985f8ba4a3232N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5610fd17830b8e3953abd49111a972f98
SHA132f4836645e349852e6002ecfd31526cd3a65f72
SHA2561711ef6e5a72aee352b50e65ed5a5c6cec41885c3c8ef79d0f4a9b7127a83821
SHA512d6a71ba215dcbd1d6e46ac2af44cf0d6fd6f1a445d3115c1159a0c1eee3664621220f484e878bb3133ab41278e2ed06669350690d53ed6b24f15b6e1b07014d8