Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 08:50
Behavioral task
behavioral1
Sample
958b3622f7e5df668d5ff4ac393d6adbf666cf637d8014f8485f0508575e6d47N.exe
Resource
win7-20240903-en
General
-
Target
958b3622f7e5df668d5ff4ac393d6adbf666cf637d8014f8485f0508575e6d47N.exe
-
Size
83KB
-
MD5
278503bba72688843bcba2898b24d080
-
SHA1
9414396d5a65fc291027da04af3477eac4a78c12
-
SHA256
958b3622f7e5df668d5ff4ac393d6adbf666cf637d8014f8485f0508575e6d47
-
SHA512
03ce8e2222b684f2b957f45a5222de185dea1a0becb53550fc145ec21cb8e86eaea177473e289a2d02563bd5d424f48509b74ef2f4ba603c8e156ec713d548ca
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sK:LJ0TAz6Mte4A+aaZx8EnCGVus
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4564-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4564-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4564-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4564-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023ba2-11.dat upx behavioral2/memory/4564-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4564-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 958b3622f7e5df668d5ff4ac393d6adbf666cf637d8014f8485f0508575e6d47N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD509f3777fb94579531f7e900f3fb01485
SHA16e04b4a0366451010ae996f411bc5223d14ac0ac
SHA25605fe0256ae81a6495469963b960d77652326ca04df2fd8cc06c2ad9e0636ed6f
SHA51253753dd18bc5a8065972002551d49ea715e2d20a4130e91bbaaab19f4d25592515338a50f181c4f6cb5e69452e0a87107f5161876b2bddf8e30587b4d39149a5