Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:25
Behavioral task
behavioral1
Sample
6e30144ea98d55fc442801bdf327df5fdc9dbcef5a0f6c12614ab4e63c21127cN.exe
Resource
win7-20241010-en
General
-
Target
6e30144ea98d55fc442801bdf327df5fdc9dbcef5a0f6c12614ab4e63c21127cN.exe
-
Size
83KB
-
MD5
6e97a8deba383a1715d72dc82f73fd50
-
SHA1
10439849458dfab19cbc9a7c08e4a35dc86ab9a4
-
SHA256
6e30144ea98d55fc442801bdf327df5fdc9dbcef5a0f6c12614ab4e63c21127c
-
SHA512
99cd2239504a34dac67ebee8201e860069eb229990c85126500d6a4c7ba5ee18ec414ae20a7ee730430af6971db2c8e481170e7423584c473c4f750a727911b2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+/K:LJ0TAz6Mte4A+aaZx8EnCGVu/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3740-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3740-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3740-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023ba2-11.dat upx behavioral2/memory/3740-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3740-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e30144ea98d55fc442801bdf327df5fdc9dbcef5a0f6c12614ab4e63c21127cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5ac42c2ecea27a6208379ffab39e3e428
SHA18bbc1735a12a2673608a438bcb082447164fab4a
SHA25693f21005e55ae97a913466d958a96a6b9f71efe15e7be1a9fc15338584442a20
SHA512cd863cfdc65c08c1d3efb0f408f9a9fc187d34c80a1dbe8249ae0a34d2d67150cef3753555bad1299b80f86e8d6de449dc10b59f13f10c86206b8da7fc9f3a42