Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 10:46
Behavioral task
behavioral1
Sample
a56af58f8328693c308e0c7e7316ab5923bf389d0e5d81fe8c34089be3e1a8f6N.exe
Resource
win7-20240903-en
General
-
Target
a56af58f8328693c308e0c7e7316ab5923bf389d0e5d81fe8c34089be3e1a8f6N.exe
-
Size
83KB
-
MD5
bd2a9819eeb9c0fb7ea875b99cc2ef20
-
SHA1
32b86b68673dfc5cde96428587939c215418476c
-
SHA256
a56af58f8328693c308e0c7e7316ab5923bf389d0e5d81fe8c34089be3e1a8f6
-
SHA512
b312967aa881d55bc3fb1a993ebabdf81187048d914a29cfbb04cc9c3c2f1a6f7638c7dfeaf54d590d7088c6517742cd4c5eeba22842ab1c54db8964af12a589
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4880-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b8a-12.dat upx behavioral2/memory/4880-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4880-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a56af58f8328693c308e0c7e7316ab5923bf389d0e5d81fe8c34089be3e1a8f6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD509d1ff24fb4b4a3192e36b79c0154700
SHA19e814a00884de2c55273edb30cf9a9f443ae49d5
SHA256c9e829a35ce8f3df4fc102f05bcd2e010e6ee12d62f22a73ceca738ecc54938b
SHA5120a7a87751ec393c958ee76a9daab7c9cb55bf6fdda1bcc5572cb928453e6a57b488aa65412780fefd978722fdc692efa38283c7490907df76a867267caef7bfd