Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 13:48
Behavioral task
behavioral1
Sample
fdecf517c2bd62db3c2cf0e681903589600fd40b24eb4777dc35e370ab58e551N.exe
Resource
win7-20240903-en
General
-
Target
fdecf517c2bd62db3c2cf0e681903589600fd40b24eb4777dc35e370ab58e551N.exe
-
Size
83KB
-
MD5
3ec1be0ed73cd3ba9ee35880491d1430
-
SHA1
a1be33ba1bd4581671462bd8fc91dcefb2c6eaf6
-
SHA256
fdecf517c2bd62db3c2cf0e681903589600fd40b24eb4777dc35e370ab58e551
-
SHA512
2bba372571d7869361cf22b72afc3a1203eaadc9d54b67be8f640c075613f084191fd682edfd5ab45c0500da9017a295136e596fa98e40ee6a4e91baf158eea2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/956-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/956-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/956-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/956-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023bda-11.dat upx behavioral2/memory/956-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/956-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdecf517c2bd62db3c2cf0e681903589600fd40b24eb4777dc35e370ab58e551N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5b905f60e596a841878824afac0cc1492
SHA1125bc3fb780fc3d58cb4b2c2a31633f4e2a5ab5b
SHA256260b1c5a6fcbe32b56cd61446ea7b55abc825c983ca008be014a54e9ec817548
SHA512f890a4a80afb295eadf82e2a4362ac42ec1e88699ba5ed0c01172cbe413a87e771ddbee268306c05991cf82d02f590cd8bd6226fa7d6668ca22eafa9b084a2e3