Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:49
Behavioral task
behavioral1
Sample
772c2fd095bf0b89b4bf11297e04dcfd97f17159d8713c8d989dd7625916c074.exe
Resource
win7-20241023-en
General
-
Target
772c2fd095bf0b89b4bf11297e04dcfd97f17159d8713c8d989dd7625916c074.exe
-
Size
83KB
-
MD5
21a6cdeb4aeb07b489c236c19cf8a179
-
SHA1
a767d4c542a966769eef5a576a83bf7e4aedde80
-
SHA256
772c2fd095bf0b89b4bf11297e04dcfd97f17159d8713c8d989dd7625916c074
-
SHA512
703136b3379b5f58ccd2e41b98d3a096d26d654e383fcdc78a462e489a80d36f2cdf317ba05959a3b82989f160eccc40fbc4a410cbce266d8a077922fa0b6b4b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mKe:LJ0TAz6Mte4A+aaZx8EnCGVumX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3376-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3376-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3376-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3376-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023c66-11.dat upx behavioral2/memory/3376-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3376-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 772c2fd095bf0b89b4bf11297e04dcfd97f17159d8713c8d989dd7625916c074.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f09f2cff19a7fc638b43d48adfaac153
SHA17462dc9df5478ae69e868459cfd7c1350d5e5889
SHA256d3b1b253e4977e3d5074ae1f40679b847884887f1396faee34c814f0df270355
SHA5129b6bf7ec125126953e3e49193aeb140cf7e80dc9946fb9d45f893fec6672d6c4f0a8724b3d3bc3762ee7005e616cd670218e9eed26ed0580e22abb4dbfae6a52