Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 13:36
Behavioral task
behavioral1
Sample
b0c942c7fe31368ba8b98647cd1263944b832664e6ff445537bab1f2e4e0286cN.exe
Resource
win7-20240903-en
General
-
Target
b0c942c7fe31368ba8b98647cd1263944b832664e6ff445537bab1f2e4e0286cN.exe
-
Size
83KB
-
MD5
f90d1e50265b766ffe69f9d895354890
-
SHA1
80acdcbc7668eaafaf9befd9ba4527623b3f96da
-
SHA256
b0c942c7fe31368ba8b98647cd1263944b832664e6ff445537bab1f2e4e0286c
-
SHA512
24aa6716d7903c52d5e5221b2e7e52c15d41f3634afcbe1a7ddbcc8b7d0272f049f6309e21c2f468f0b8d523cc557862753ab4038f1dc2d5af0309b93e1db0bf
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1124-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1124-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1124-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1124-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1124-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c99-13.dat upx behavioral2/memory/1124-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1124-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0c942c7fe31368ba8b98647cd1263944b832664e6ff445537bab1f2e4e0286cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d8bf683965f1d3a0e2e16ea5f8996f9a
SHA1245f66ddaf6bac6a73c17d64c5351b2b5add6214
SHA2562181f990c8a237141ff582a3503a80aefac9559e860f52c415d7b14360b27d9e
SHA5122e8b382bc5edfc3be7857908888bbb856538dcb87a5b7313099fb7e2b87e8befc6c6690247c9668056a8ca80efc5014c206d88147b2eff92e2ad636087998dc2