Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 08:47
Behavioral task
behavioral1
Sample
b66d466e071145eddac1423147e280054ea2a44cb8d911fccf72c7015486fd2eN.exe
Resource
win7-20240903-en
General
-
Target
b66d466e071145eddac1423147e280054ea2a44cb8d911fccf72c7015486fd2eN.exe
-
Size
83KB
-
MD5
55745cb9a5705c051bfeccdc6a657ec0
-
SHA1
4bc46b8d374d5ec5b8d11d488fbb843c0ab5d2a2
-
SHA256
b66d466e071145eddac1423147e280054ea2a44cb8d911fccf72c7015486fd2e
-
SHA512
1e36c8115c574e3bc1a596cfff9167f4799bfaf7820247e9d265b38da5bdebe060d1d1a24e9bf7875ae2ea14c760f0389b84dcb2a47d6df2f9a0d91442129c4d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2740-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cae-11.dat upx behavioral2/memory/2740-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2740-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b66d466e071145eddac1423147e280054ea2a44cb8d911fccf72c7015486fd2eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58f0ebaf5ee12cf556cfd642931532d27
SHA17e3a9497de71ba5bc4b40243b38d92bf75bf67c9
SHA256e5f18e331cd10bb443e294efaf736e59c3d31f2b2b2160ec518c06f566bded76
SHA512a01ec4099f87ba35ed3cc75aa42559fda06942316fc21b26fad798cba26006a53f01bf60ede25ba6c8bd71650ef65cfb6c5bad8e57cf9e1fe79c03f955a79e57