Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 16:41
Behavioral task
behavioral1
Sample
ec160b05740d1fcc166db65832d6504190489e10593bf6bea0b07fe906dd2b74N.exe
Resource
win7-20241023-en
General
-
Target
ec160b05740d1fcc166db65832d6504190489e10593bf6bea0b07fe906dd2b74N.exe
-
Size
83KB
-
MD5
0c706d3034dba2806f9cd9f61ba73e60
-
SHA1
3e49a5a0221598cc1ad12cf514770c94f0f2b974
-
SHA256
ec160b05740d1fcc166db65832d6504190489e10593bf6bea0b07fe906dd2b74
-
SHA512
63201e796cb2661df2b77c12cc44a36675d9bc18af930849605b9fa7a4ecb6dc67329cec761a2d5ad22cddf5f8b76da33145b675f1e4234e7ef3b1f2afeea0c6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+pK:LJ0TAz6Mte4A+aaZx8EnCGVup
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/468-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b96-13.dat upx behavioral2/memory/468-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec160b05740d1fcc166db65832d6504190489e10593bf6bea0b07fe906dd2b74N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52507a59c81db4c78c9159786402d4726
SHA15c2e2803dfc52b298fc6c187310ba032e08362c9
SHA25660d8502e95f709db3cbdddc2c1743f0aaeed9f1c61e3b89e3d34711f1f23efd2
SHA5125217118bd1c3b60d792f31b52eea801e427f39a108a637d23f7217a6ceba0995ae94b36fa43de8e84f6fcd3c4a7a10a86aee9db7a11a9e40e1b9352d4c984580