Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:26
Behavioral task
behavioral1
Sample
616a1ba062d62c990d5ec899290ac9ce4e6c2afb88d66b6bf32bd152cdb3bfceN.exe
Resource
win7-20240903-en
General
-
Target
616a1ba062d62c990d5ec899290ac9ce4e6c2afb88d66b6bf32bd152cdb3bfceN.exe
-
Size
83KB
-
MD5
08f638767972c096196e8d7246bf7450
-
SHA1
61fb0bc946c3c68cfc68a9c21f86230b1d5a6f04
-
SHA256
616a1ba062d62c990d5ec899290ac9ce4e6c2afb88d66b6bf32bd152cdb3bfce
-
SHA512
a525aecd85a10c856b7209884802fca757df5b6bed97b832c43cf6c3bd18a78a0cea8ab030fb2e230438fc895b1c6d920b5a159c81c36ce7d6d7a1441b00b92e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+HK:LJ0TAz6Mte4A+aaZx8EnCGVuH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3608-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3608-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3608-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3608-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3608-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c77-12.dat upx behavioral2/memory/3608-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3608-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 616a1ba062d62c990d5ec899290ac9ce4e6c2afb88d66b6bf32bd152cdb3bfceN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cb2b0ef2fb97457553b6b0d0ee924506
SHA18d58b6edded008e162ad4c80dfe8a26dab418645
SHA2567b51e8a9b26c229259c822ea6337a01425faae3c0e9406c5cd41fb1bace64fe8
SHA51269d3d9793bdd177cd64a6fc70befbbbaedbf4bde2db4685344d0051f842c993186b3cb30126b96b221346d25f8b78d710211688e7bf1846c0f2f30d9ee2e3bf9