Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 01:29
Behavioral task
behavioral1
Sample
d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe
Resource
win7-20240729-en
General
-
Target
d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe
-
Size
83KB
-
MD5
4d8978a6c5be8379d6866d0c0d472950
-
SHA1
f25997f20a51b5637100a5fd78b734694bf4676e
-
SHA256
d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38
-
SHA512
69a092a2f15a89026a61b1d5b65bf56f8a8b50265b79d1844b252aa8b9ae08bfb0a1165388089ac69c4a02c9dd883109590450a17cac088ed42983c65b30edb9
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4064-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4064-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4064-5-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-eBO0shpzJ9xqtaUs.exe upx behavioral2/memory/4064-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4064-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4064-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d36fad32e38d5150d3caf32c4651d602bf2d0d78b905c98442c0ac1ba3f9ba38N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD538ade390452e3f39dbb35317ae38dee7
SHA141734d688ee5be709c0d0731e3541edc6a844fbe
SHA256df1ce53ae69a85cdc8ab7aa19cd51aedbaa5b4c7f8fa6a4546d89fa4fe34a1dd
SHA512eaae9c889e2873dfb844902888f12d50f5c23ce2727402cfc6b2faa4fa56099c847746ff171552c376a3e71b371c6516944005cfe73dd646c6b7ac42736701ec