Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 10:55
Behavioral task
behavioral1
Sample
7fd3eea06c69fbee6624e543c52397f7c07a79c820a8c40043c314fda4ce0addN.exe
Resource
win7-20241010-en
General
-
Target
7fd3eea06c69fbee6624e543c52397f7c07a79c820a8c40043c314fda4ce0addN.exe
-
Size
83KB
-
MD5
8680bb26b15f0a17f7668bd0ced5ab70
-
SHA1
fc1341bb0b49d0f423d9352bf7cff6737fb2c3d1
-
SHA256
7fd3eea06c69fbee6624e543c52397f7c07a79c820a8c40043c314fda4ce0add
-
SHA512
8b2b64e981cd47de4391cdbc5c7f00a1ee75af7f9a720627cbd61d17f4281b4f9cc19be6c5580bee17f1f3bf00d92b889e60638775974525bf066c87afff6dd6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hK:LJ0TAz6Mte4A+aaZx8EnCGVuh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3760-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3760-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3760-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3760-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000a000000023bc1-12.dat upx behavioral2/memory/3760-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3760-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fd3eea06c69fbee6624e543c52397f7c07a79c820a8c40043c314fda4ce0addN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d1a386204c29cc177b921e139fd30430
SHA1ff8ba642da0816e25d9326de4417ae8ebc8bf51b
SHA256a29fee56ee09dcfa80d8f1408dd2350426b11eb86b56c9127c8b706a8b814b08
SHA51286640fbc2f5042f3fb4a33baa93ca269c19f380031bab96937fb92cf468529d8ce2bd0dd1be039cf159eefbcb329d184bc55103567ac7cd840154bea1989b0a9