Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:32
Behavioral task
behavioral1
Sample
210b2871ea1732c76bf00a9a7a6ff5724027bd0dcedb05a5d2e8dfc3a497ec44N.exe
Resource
win7-20240903-en
General
-
Target
210b2871ea1732c76bf00a9a7a6ff5724027bd0dcedb05a5d2e8dfc3a497ec44N.exe
-
Size
83KB
-
MD5
ca6bf94ef22f917228245e7aaad9ad80
-
SHA1
b54bd0a45ffa306b5f2547b79572d1ec92464cbc
-
SHA256
210b2871ea1732c76bf00a9a7a6ff5724027bd0dcedb05a5d2e8dfc3a497ec44
-
SHA512
6880f35899681f03ed56f70156d5be5bc532791aed8117649065d0e6d0886bd5568799d0d987d53047fc4d56caab6708f2aa510abe3e1e6b308ea57d4d8980e2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3520-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3520-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3520-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3520-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023ca7-12.dat upx behavioral2/memory/3520-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3520-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 210b2871ea1732c76bf00a9a7a6ff5724027bd0dcedb05a5d2e8dfc3a497ec44N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50b7a4a53a1d5292e42080db35ab7ddc2
SHA12acab71c249ee5487992bba3083d5461e58d628c
SHA256b80c1f19ec19aa82fe044a534d6c89cd0234b30e376544c2bd881b57c6846e2b
SHA51243f42a9e676c6bf8f8c4016109be955fba22a34f05afa640d6c7144cd1f41e31bc5d7ee7763b6f23395f9fc19657e32f1d5728a4a70fa7f9d6ac72e34f802ede