Analysis
-
max time kernel
110s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:50
Behavioral task
behavioral1
Sample
cdd883b33f01dec2b3cb7925e26af2924682a9c90fea916c8b4d469ec5f46a1dN.exe
Resource
win7-20240903-en
General
-
Target
cdd883b33f01dec2b3cb7925e26af2924682a9c90fea916c8b4d469ec5f46a1dN.exe
-
Size
83KB
-
MD5
c9c2ca0874d156613e47a453d879dc50
-
SHA1
b44b23222bc1932699c82d13b9bad8d688173235
-
SHA256
cdd883b33f01dec2b3cb7925e26af2924682a9c90fea916c8b4d469ec5f46a1d
-
SHA512
4556aea1ba4419161704c276a47ff3ed175463be88b38404d6ff8b27d3ad6e2e161ec4f21e099f3b59eb8ae2d4411bb09bb04227b03658bee7126821444a8729
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WK:LJ0TAz6Mte4A+aaZx8EnCGVuW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1320-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1320-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1320-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb4-11.dat upx behavioral2/memory/1320-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1320-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdd883b33f01dec2b3cb7925e26af2924682a9c90fea916c8b4d469ec5f46a1dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD53fa5313817c484c066df037e50d4b349
SHA188cb69e9269083614541903d5a651e498fc288f4
SHA256c3148b4b675b91cd65ffbd597df981774109b994a8a1287d7615ee3ae0fa5064
SHA5127e41630799988464f17254229eb5c64005721f405bc800016100acb8d38b57e0ab815764bc6e9510d7294539f574833618b07f42c9a60fa05f7b23fe36656b33