Analysis
-
max time kernel
111s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 10:11
Behavioral task
behavioral1
Sample
2d7557d4be7f42e278d7301816b1aa036d4191e640052aa4ebfbff6349f8988bN.exe
Resource
win7-20241010-en
General
-
Target
2d7557d4be7f42e278d7301816b1aa036d4191e640052aa4ebfbff6349f8988bN.exe
-
Size
83KB
-
MD5
743b689203982fcc4ebfeedc0f057200
-
SHA1
7e25079773f6c7ab080391885e0001628b86df55
-
SHA256
2d7557d4be7f42e278d7301816b1aa036d4191e640052aa4ebfbff6349f8988b
-
SHA512
4b3a8817f50eda79ca31e7ebc530d7251b4f00ed969297c4793681b004001539647b42d78c34df2a45627df2ef1f67b19c8474d9750d9b412a4cc230b49579f2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1180-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1180-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1180-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1180-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023c2a-13.dat upx behavioral2/memory/1180-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1180-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d7557d4be7f42e278d7301816b1aa036d4191e640052aa4ebfbff6349f8988bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5766a9996c30dc3557ec227d59ef6a5fd
SHA1bb2227eca15205eb9d657ca9ce1771d8cce15324
SHA256208103c592a1dc0fe93b5a3c66fce8a1da4789ac7c2b8c152bb666eacb9f2cc6
SHA5123a49670a027187a69c673a96cfec42332d9bba94e9b0358e3d3f89796b86c13c7ac1b91ee3e6eb3b2086537ef015a236ee0bc22c312576d83b2e3ed2ef32d636