Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:37
Behavioral task
behavioral1
Sample
bcf5472a06b3c92f0b27afe1dbea78df93b0df5d9c74d021eb605baf4a1d4978N.exe
Resource
win7-20240729-en
General
-
Target
bcf5472a06b3c92f0b27afe1dbea78df93b0df5d9c74d021eb605baf4a1d4978N.exe
-
Size
83KB
-
MD5
de7f0e6f91a6071a6dbf1028e173f770
-
SHA1
1282e55bfc4763b3bd86a26c7165e4838e00c0e4
-
SHA256
bcf5472a06b3c92f0b27afe1dbea78df93b0df5d9c74d021eb605baf4a1d4978
-
SHA512
87964c4bddf6738035292f512393563600af8f60e777b3a6ee11664046b3bca94e362e79ebbcadbc92e6fe9ad04cf99db33cc2100b7703455c23c77bf7d42694
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1304-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1304-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1304-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1304-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023c10-12.dat upx behavioral2/memory/1304-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1304-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcf5472a06b3c92f0b27afe1dbea78df93b0df5d9c74d021eb605baf4a1d4978N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD590d609e1c1f6db0f6fe5b68771aef478
SHA15aa739122c9529d004e732813c3562fc193b9b7e
SHA2568b26a1bd30085ed234a2cb5273ca499a1a3990d427a9dd8ac4d06537618b74e5
SHA5128a53c55c144aaedb8dfaa9d5c22288b8302620d27c1f39e2f1e425a7d66c1dd10e40d2f19861a7b96610c167c878e8548703d0aa06ce0a54555f07e8c36e6197