Analysis
-
max time kernel
95s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 14:58
Behavioral task
behavioral1
Sample
380b950a6797754cda063061782b5b81a0a0f9dbd763b49590b35d920a60eea8N.exe
Resource
win7-20241010-en
General
-
Target
380b950a6797754cda063061782b5b81a0a0f9dbd763b49590b35d920a60eea8N.exe
-
Size
236KB
-
MD5
ed7232bbf68854f5380a5d6bcb7cc810
-
SHA1
b2df30fb09f4c4c58026cef134519207425437e9
-
SHA256
380b950a6797754cda063061782b5b81a0a0f9dbd763b49590b35d920a60eea8
-
SHA512
d48c792229cbb390b5b7e8604edd19e7072caee3daea13701023c0baf2867630bc72abb39390b51872cdb9ac0031b730853f8a2f12e70778e2dbec119ebe1aed
-
SSDEEP
3072:6J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/e/FnncroP9:OwDeM7iNEkgiOb31k1ECgJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1320-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1320-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023cb4-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 380b950a6797754cda063061782b5b81a0a0f9dbd763b49590b35d920a60eea8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD562995ad6e484ab39afdca1c3cca99e6c
SHA192f373f7986b738f8a77c18c28621dc9e192a682
SHA256d5720e32b74f8fb368be28084c42d621654cad973cf0237f147e4aac6b6ca780
SHA512330580d3cb762e3963f77e33e35e3673c25bdbe7fc013ed8628d05e7a8b744a22e63c57c93ad677682d77ba83aa94f2eec60437ee64b760bd13ed03aa0162f65