Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 15:35
Behavioral task
behavioral1
Sample
fc0b30ad255e9e0abab61ba44ec07a68ebefd96ad37f2a37521f226a2ec0c041N.exe
Resource
win7-20240729-en
General
-
Target
fc0b30ad255e9e0abab61ba44ec07a68ebefd96ad37f2a37521f226a2ec0c041N.exe
-
Size
83KB
-
MD5
735fa55ebe0459e68491d36ddd095f20
-
SHA1
74b84bed6c9d3688e38b34a7833808e7d611b895
-
SHA256
fc0b30ad255e9e0abab61ba44ec07a68ebefd96ad37f2a37521f226a2ec0c041
-
SHA512
19c6884be31acf9ac319476be892da62ab4457b7eb43cec5e163d31c725f86612c2aa5993e6782d1d841b58ff7662d549e6f6888ac8f5bef2ffedae3ed20f381
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5000-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb4-12.dat upx behavioral2/memory/5000-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5000-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc0b30ad255e9e0abab61ba44ec07a68ebefd96ad37f2a37521f226a2ec0c041N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5556c78f0893ab536a99c0428161ea5a4
SHA14784021d7d4ffc2bdc71e55d00d317c55d2b07d1
SHA256a1d97860878e79a66e2ea0da0af2e390139ffff65d0e29425b50871f194ff13c
SHA512b02409f52559ed26617749a938f77a4f604c127af3d0baf6e0466e5e89373765c73f902cd15872457dfd71bc7fe259af934a14ebc0aa58d8af3e71c075a8a6d2