Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 18:22
Behavioral task
behavioral1
Sample
9ed9d19a376168026474b98c0f0cfe929b6b281aa8169e8b528a41dac4d7aaa2N.exe
Resource
win7-20240903-en
General
-
Target
9ed9d19a376168026474b98c0f0cfe929b6b281aa8169e8b528a41dac4d7aaa2N.exe
-
Size
236KB
-
MD5
0214b806994b927d6c240c008b726b20
-
SHA1
28f48a5f42fef3d92457f8aba7556126f4b3f020
-
SHA256
9ed9d19a376168026474b98c0f0cfe929b6b281aa8169e8b528a41dac4d7aaa2
-
SHA512
9be200f5b258ed72dd5fdd06af5da9401d971b9b2cd2639b60194ae1aeadd952fe385cecaf4fceb5209848cf397550f94e307b32cb03f0b693c60160d7fa13e0
-
SSDEEP
3072:4J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/D/FnncroP9:8wDeM7iNEkgiOb31k1ECjJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3756-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/3756-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023cc5-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ed9d19a376168026474b98c0f0cfe929b6b281aa8169e8b528a41dac4d7aaa2N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD589249f1be4ca161ba918dd846979b5d4
SHA1389c565c6266df00a0adf7e2edc7223008c260f4
SHA256614fe9a7fddbfa86b87c1b87688e8028263ec798bd31b604199a894282327877
SHA512502619ca814bdd19f3975138a8d42094ba8f1a53d8672067a739158e2c4b83b4b4ad1b94cfc57cd2d5c33b1986d5316e0278d9e76da93cb9fb41f612ba1428fa