Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 10:50
Behavioral task
behavioral1
Sample
0dcccc24eddb4142aeb31911a614d87002de75433aabbd044dc227a0a9d379f1N.exe
Resource
win7-20241010-en
General
-
Target
0dcccc24eddb4142aeb31911a614d87002de75433aabbd044dc227a0a9d379f1N.exe
-
Size
83KB
-
MD5
9cef1f6df02e058eddfec6ec68df3710
-
SHA1
2be37e323dacc44550a98c32e8119feba22289b0
-
SHA256
0dcccc24eddb4142aeb31911a614d87002de75433aabbd044dc227a0a9d379f1
-
SHA512
fccb741beb935c3304792ec567b2f3dd325a214f3f2430ba625f0e94b79942bfe327552515d42ffbdf2c9ea3bd999d2200fb66be8f94cea8fb0696cbf4a89749
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+uK:LJ0TAz6Mte4A+aaZx8EnCGVuu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3140-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3140-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3140-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cc1-11.dat upx behavioral2/memory/3140-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3140-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dcccc24eddb4142aeb31911a614d87002de75433aabbd044dc227a0a9d379f1N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD51a88a02dd2e9e12a5b8666b81600b411
SHA1425386470a489654c6e5a972061e95cec08821c3
SHA256ba20667f897b73848db0d04127280192b4eda9134857f6d454ceda17d4e528b1
SHA51249bdb16060385bf9657167a426600fd9e46f486892e20a940cb0bb22e530bea2c218620030423a1aa9755e25837d41e7e65b829c5015bcdd47e545179b27bb6c