Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 11:56
Behavioral task
behavioral1
Sample
c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451.exe
Resource
win7-20241010-en
General
-
Target
c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451.exe
-
Size
236KB
-
MD5
170090b66d3e81cd08c30f9db7bdf852
-
SHA1
bbeaaf2a2d1314a6954ed899d1cd6e04094d99ec
-
SHA256
c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451
-
SHA512
92021ff9901f59a6b21f9d8f2977d68e3221a8dcda6ddcbea7c9b6a2fb54334dc23869c990768adb02c01bc63b5a0cfd0a9a456acf45196431a472d64c4561ac
-
SSDEEP
3072:MJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/S/FnncroP9t:QwDeM7iNEkgiOb31k1EC0J/Ft
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4212-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4212-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0008000000023ca4-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9b4e8dc8018028ef6cc7e2d804ab12f2749754bff185f310ebfed049a36d451.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5c22f862bc8566f0b6b1dbf28db249e43
SHA1fe5ad07e17da9485d020fa762bd95a77a6134ada
SHA2568b578f82328bb7fd1fd2ff62e591864f199b4a4355760ef68fbfe8bf23440b0b
SHA512a8637612fa37bf6d6c2936ddb724b40213620d535418e9e17178a23aa5aa865ce9908f838e258e67cf5c5b2354fc3b1f0cee7c8af82052c6c93b6357e868e2df