Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:28
Behavioral task
behavioral1
Sample
4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe
Resource
win7-20241010-en
General
-
Target
4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe
-
Size
83KB
-
MD5
937d1c01b091dc764ecd5583c2d13380
-
SHA1
8ed4036de836df820d4f1d14a846f28be4486f75
-
SHA256
4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8d
-
SHA512
6d4225c226dd1dcf46bf05c5b5cc19fb39161ee6d3ab3853afaade0618ee3f69b41745dd7e843b408f454ec428295e5b23ebc13db4ea0f3e58d17ffd7424fcf4
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iK:LJ0TAz6Mte4A+aaZx8EnCGVui
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/652-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/652-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/652-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/652-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/652-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023ba6-12.dat upx behavioral2/memory/652-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/652-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4853f03224f1a361a613686f687c64fb96321818d4e64a3c81cdcb406a43cd8dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5b685ee5093d8daefad5db9df5f5e7867
SHA132f8ae145e41c36caad678f7e34d5c00ab766227
SHA256389c347a3eedabb66f70871882329e6d693680c1b748906fbe468a08174d9ac0
SHA512ca4d9fa094f76fa6462799134cf10ca56c16f5f6d1e9ed3635779969cddb448bbc7c9e0ad735a9670f5569c4813825788f3d50e52b60ec4e4237df9e7f3082ff