Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 10:21
Behavioral task
behavioral1
Sample
3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe
Resource
win7-20240903-en
General
-
Target
3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe
-
Size
83KB
-
MD5
5c084a7848bc4351227909685cb54de0
-
SHA1
44d9ed37c8b2e951bb806780d735331f9f1039c4
-
SHA256
3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86
-
SHA512
edf5b88b29c494311e97229ae4401f38ee69dd6bb14847f6842d5693e5ef5a2ae0f2646a5d90d41af292dde726916377cce6afce9c40f749dfc70b687d79041f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+LK:LJ0TAz6Mte4A+aaZx8EnCGVuL
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5044-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5044-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5044-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5044-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c67-11.dat upx behavioral2/memory/5044-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5044-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c60be65e5e827cf503b96827a768938af0a84d725fe3d6e839fef264a60ca86N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5728a90c82e1c789e95749ad9edfbc8ed
SHA102bba34e67080a5ec4a0e9400564257d4ce4fe83
SHA2566fb9ad59ef54ca66355c826cd49fcd7b33e09aec7c1570c45cbedf842843ac5b
SHA51290eeeb05002a8c92f9a3a89bcd78d17fee0a05b69db5e17e48984eec71f70122d3647b15100d76864653fa391c7ec4b9058cf686ab3dd8920d250de8658050ba