Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 10:25
Behavioral task
behavioral1
Sample
63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe
Resource
win7-20241010-en
General
-
Target
63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe
-
Size
83KB
-
MD5
c59a4d7e78afaa4348b0cfd9f2366610
-
SHA1
53a474a32938bec041a525656af375d3b1f42998
-
SHA256
63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1
-
SHA512
31548dbcd842b0730a0426552ff50f2f88d0dfe049fc15c827c45d47da6e9127fc238ed2c5019fde886267357b91bb6885890c20dbc2fa62c374161c1ab1e162
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4784-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cbb-11.dat upx behavioral2/memory/4784-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4784-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63af664c37c96b01c8b41a160f6abd03ea3095f99bd8d4d7c84818bbaafdede1N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5ac228b710262587f5c33a3faa5a0ca44
SHA106e860f03f5a2b65b73065a865457a880e7ce51f
SHA25631f4a398c4e45f0e18e809c8c52cb39f4f12160d6e8811a8e817cc2e9caae94d
SHA51213003d6f458928199c3787f8f5a7cc9469fd3fa45b67ef0bc086eb5746ee395556050cbf2d6eed4c51299cdefce5cb4150db326797e8fb672e43389fe8f5a6e7