Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 13:47
Behavioral task
behavioral1
Sample
5ecef7a72ccfad6cdf3fbe6d293e8628054409a4346b9d935238cfc4a7357bb9N.exe
Resource
win7-20240903-en
General
-
Target
5ecef7a72ccfad6cdf3fbe6d293e8628054409a4346b9d935238cfc4a7357bb9N.exe
-
Size
83KB
-
MD5
2c68371d5e81af3c7ba6dc46e218dda0
-
SHA1
1a72bc74ee1ed4dfdbce927db5f607381fdd5855
-
SHA256
5ecef7a72ccfad6cdf3fbe6d293e8628054409a4346b9d935238cfc4a7357bb9
-
SHA512
270d2ff28aa9005bb0f61e7a7445d397d1ed9c8411a428d289a2b55b585c5be5c0a840e595504fe6336d7beea319fbdba361210d4a70ffbde8999d587e9f6028
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2580-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2580-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2580-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2580-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b41-11.dat upx behavioral2/memory/2580-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2580-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ecef7a72ccfad6cdf3fbe6d293e8628054409a4346b9d935238cfc4a7357bb9N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD53d8bffb894ef66e582865dc15c0192b4
SHA1995386e6fdb0c6aec1dc16fed031896b844062f1
SHA256e4073052155e1671d141ea95b902025c59c98ecad0c08ee0b89630863b60f353
SHA512566acf51e3a49c47df5c7fb3c8b4bbb45c4ca2762eaceb3ac0cb1190592d6fc3776f50c7be31d1921a9f8782a4ae87bce4aa30d2a4cc6e32e127fef6ae833189