Analysis
-
max time kernel
110s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 09:43
Behavioral task
behavioral1
Sample
14885ad822033cb1593edeea47cece006a3322586514371cb9939913fa106798N.exe
Resource
win7-20240903-en
General
-
Target
14885ad822033cb1593edeea47cece006a3322586514371cb9939913fa106798N.exe
-
Size
83KB
-
MD5
1219c2b614dec84566b46b92705db690
-
SHA1
6d66a4d746ce326c67dd925abb32745c7bea2a5c
-
SHA256
14885ad822033cb1593edeea47cece006a3322586514371cb9939913fa106798
-
SHA512
42198c1dade04096e244126219f63e23c91e6d27eb183e23d387f4db03e610b0932c4cee2511414b0ad7a19a1af204f55ebf17b3f1292cbf14e1799b46596f87
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b90-11.dat upx behavioral2/memory/4500-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14885ad822033cb1593edeea47cece006a3322586514371cb9939913fa106798N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cc20ac53ea9675afed5df2ff20e84624
SHA1bce697982bc2955c7aca7155f2d1ca5053e17f07
SHA25695da7153d42adeb23bd39b7092eb1ed9ced03cb24ac6a656ece7f45c98fce288
SHA5127d2d64878352b34184042c466da4d5f999fb1744981a546df4cba236f7bf2ad7e223c823fce9c7d2ec2d6d06561856f19d575375494c2b3e9472530ef36c7fc0