Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 09:40
Behavioral task
behavioral1
Sample
ff8227b1990376f7ecbc76b2a2c225a2d59f7c5ec5e5e2ddfa1ff692e88c66b4N.exe
Resource
win7-20241023-en
General
-
Target
ff8227b1990376f7ecbc76b2a2c225a2d59f7c5ec5e5e2ddfa1ff692e88c66b4N.exe
-
Size
83KB
-
MD5
f9eb19c775655615218018c86771ff10
-
SHA1
683d2ffb8454d98c0b2a9ddc1e6daca384cf800c
-
SHA256
ff8227b1990376f7ecbc76b2a2c225a2d59f7c5ec5e5e2ddfa1ff692e88c66b4
-
SHA512
c06774c61b0bea32e358ded84b92753d78207b9f4c65ca40e1b4cd2c56c5aec5ac6948c6e19e4063a7142578629c3b1d2351e32047bc0c058b3fc18a16e7b043
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK:LJ0TAz6Mte4A+aaZx8EnCGVuU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1928-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1928-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1928-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1928-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000a000000023bbe-12.dat upx behavioral2/memory/1928-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1928-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff8227b1990376f7ecbc76b2a2c225a2d59f7c5ec5e5e2ddfa1ff692e88c66b4N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d19395b00f301875f63f5eb1a1e34a3b
SHA13d838f78760dcc5d0043eb60fb489f251b99bd35
SHA2562d19b09fdc097c6ffeb549f31b4ea54e307410fdff58fff0ffe8f41527c1f309
SHA512b8ff98100b27f20406e3efd7554231ea771c5f22901d196743ceffc2275b8210aa67d2feff2b4647f9e269fd61bbf478eb29d5c9b73d0849b92060a5c79a226a