Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 13:35
Behavioral task
behavioral1
Sample
622feca43f5b18f1709ded7dd26b287a6a0dbde0b5105bf3aa835e33f5e37447N.exe
Resource
win7-20241010-en
General
-
Target
622feca43f5b18f1709ded7dd26b287a6a0dbde0b5105bf3aa835e33f5e37447N.exe
-
Size
83KB
-
MD5
39f510b36182444764d018ac4c679ff0
-
SHA1
5871253c1050ebc746f4f2bdee487083ed682622
-
SHA256
622feca43f5b18f1709ded7dd26b287a6a0dbde0b5105bf3aa835e33f5e37447
-
SHA512
f73817d0d44312368a311fa38dd4b7220a776241f26dd3c546d071c00a0137e48c322fd46af09378452c2697458b7f43c47fb43e7a4ba55a6fb0891a73156ddc
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+LK:LJ0TAz6Mte4A+aaZx8EnCGVuL
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4768-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4768-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4768-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb1-11.dat upx behavioral2/memory/4768-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4768-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 622feca43f5b18f1709ded7dd26b287a6a0dbde0b5105bf3aa835e33f5e37447N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58fce09f9ecff5f49ae352072e6fd0f2e
SHA11d2969b621440dda2b6106f8be041f671738c4cb
SHA256b36f9e0dbaa75a7ceedaed3ce7a2f7d1a077cc0ccb1f158e137146d63c453ceb
SHA5124f45b833bf54bbf696be893d067635ce3242ff2a75c99943898e9e5000e2d612ec1c8e6d8631c0c6e87af91402f08e2133f3141a13965cd7f56b1cacdc242ec7