Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 15:22
Behavioral task
behavioral1
Sample
cbbb8541c41402e15dd7e0d88e3f0fe8ae014ba2b55db6b713e508d7f4951286N.exe
Resource
win7-20240729-en
General
-
Target
cbbb8541c41402e15dd7e0d88e3f0fe8ae014ba2b55db6b713e508d7f4951286N.exe
-
Size
83KB
-
MD5
cb79e17a2d1ca6a1272d69ab2191a400
-
SHA1
8423082e1377e690ffcf5010392a5c7b9a89b4d0
-
SHA256
cbbb8541c41402e15dd7e0d88e3f0fe8ae014ba2b55db6b713e508d7f4951286
-
SHA512
2fafc6621f51b9f35bb877d1d5b56d9ed2d4d11a79598eea371ec911efa19f8f5d24d5fa0464bf2b0e2e18bf0613c5fe770f382b497b3a06d359554ff9edb372
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+bsK:LJ0TAz6Mte4A+aaZx8EnCGVubs
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2952-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cbb-11.dat upx behavioral2/memory/2952-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbbb8541c41402e15dd7e0d88e3f0fe8ae014ba2b55db6b713e508d7f4951286N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD529e7092497c916774135948f6ecaabd8
SHA15e4b8d99a738c5cb9e17be59dde7d919bea4eccd
SHA25632b216342f36ee9eacbe2c9e7b521e0ae93e5b132ae5e02f48a98d8b8f76d8b4
SHA512c78b390c97232eb2f7274ae489adea0bf91eb563cd7c6eab1ed4ca9008a851ad8200cc4c99ab67adf1e5da16c36f4c4a52f637d8a1394fb3ab6511e7deb392fd