Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 13:44
Behavioral task
behavioral1
Sample
1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe
Resource
win7-20240903-en
General
-
Target
1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe
-
Size
83KB
-
MD5
6e54cc202a8fceb73c22865c1d939680
-
SHA1
a6af26ecc54413e5a7623f73edc07f5604e22feb
-
SHA256
1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5ded
-
SHA512
e1ced3341619c137ea82f5137e9747d371b1ceb20e4448f36350af0494bfa21fb36442e928058888a99f090d8aec227aa5eec26a547f789ce95c5c415c6a39ee
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+pK:LJ0TAz6Mte4A+aaZx8EnCGVup
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2520-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2520-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2520-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2520-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023ccf-12.dat upx behavioral2/memory/2520-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2520-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1312b29ac2b7377595391c10d0de801638c3d08adaf1495a614144dc031d5dedN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5c9eb7ced84d52ffaf359c505fe090091
SHA13e399f47aeeed861c3bcb969bcfb85cbba11ed30
SHA2562e6317a25549385eb034edb6c8166c7ed9e47c193d28e15153b13f48f5351bf1
SHA512d11b5321e157500421b9326ee6ceb760ba730db22b51e0e52eaa5d7d392f3dd9522cf800a111d8287307ad720a324464f01a5a1eae16f1f23c44076c4642a91f