Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:41
Behavioral task
behavioral1
Sample
43adebf05bb120da9bc625026e110b107dea7720c2e882ff691300e6896a24b5N.exe
Resource
win7-20240903-en
General
-
Target
43adebf05bb120da9bc625026e110b107dea7720c2e882ff691300e6896a24b5N.exe
-
Size
83KB
-
MD5
07649b64b12ccff88d092db3eb9d0d50
-
SHA1
8f6d2fbfae7e1e7ce2d8c96cbfe285a3d09ebe4a
-
SHA256
43adebf05bb120da9bc625026e110b107dea7720c2e882ff691300e6896a24b5
-
SHA512
0a706060d585a7af82efe8e06abb84c5b8c6f06b603aefffbe105438b39b719c9097b68da500146c663a2a225551dc1162ec563864c2709601931f0bcd34889c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2340-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2340-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2340-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2340-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cd2-12.dat upx behavioral2/memory/2340-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2340-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43adebf05bb120da9bc625026e110b107dea7720c2e882ff691300e6896a24b5N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58569a0decb69e13b4de6ea54f9ac2582
SHA1d26798bb0a6709836f682b47ecb9626f2fdaf037
SHA256bcbbd34e62b7d508e107bbef559b587a739b4f5a3548d5f0525c65aac06c4eb1
SHA512a09f069a638297bbc2dd1e16e3645b6e7a7f7185bbfd9063b3aadc9a30dc7b01a7f731e9beff4c8701cd8c6bab128f8db1ed02f2527dbd8ae22f8aeef2c6f5a8