Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:19
Behavioral task
behavioral1
Sample
fc6f78de151d1be12f09dc71b7fefaf41dcdc908caf0b0447d40f2ac0ddbfa0eN.exe
Resource
win7-20241023-en
General
-
Target
fc6f78de151d1be12f09dc71b7fefaf41dcdc908caf0b0447d40f2ac0ddbfa0eN.exe
-
Size
83KB
-
MD5
447fbea6116cf5f6a742eef56c786970
-
SHA1
148d3c215358ca04a9a427949970275f99318453
-
SHA256
fc6f78de151d1be12f09dc71b7fefaf41dcdc908caf0b0447d40f2ac0ddbfa0e
-
SHA512
e3718c0bf11a4fb56c040860e225ac87023ac8b6cfd2a51b18103063b87690a0eaf1fc3d16d039278f3f3764d4178fbe865ecf9ecc2edbf3fec9393507126a56
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+FKe:LJ0TAz6Mte4A+aaZx8EnCGVuF3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/740-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb2-12.dat upx behavioral2/memory/740-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6f78de151d1be12f09dc71b7fefaf41dcdc908caf0b0447d40f2ac0ddbfa0eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5df3d89f5b619e33af1d55f0d184e2c45
SHA1587de94832bd42248e2c9b3fdc192854308aed25
SHA2568e78738508a2d46c82d7e0430b6e6578ef81b5aa30b91aa4fe7f62660bc0db61
SHA5127e2020b4ac6036b2de948b160a757f020a9d09659738213ae55df9d30b7a80e78629a1794055d0802186437b59c56cf34fb96bf1e8fc3cb8736491c43c89e4fe