Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:29
Behavioral task
behavioral1
Sample
c23e879fc80d37b50d1af94143ce37813e010422e4a5d7543b5eaa4c08925973.exe
Resource
win7-20241010-en
General
-
Target
c23e879fc80d37b50d1af94143ce37813e010422e4a5d7543b5eaa4c08925973.exe
-
Size
83KB
-
MD5
199d50d19ac415cc781be6fcc93d7185
-
SHA1
86ebeaa2ece720a1b7ce7ca7bae3b098e2453b96
-
SHA256
c23e879fc80d37b50d1af94143ce37813e010422e4a5d7543b5eaa4c08925973
-
SHA512
55264f2cd3941fcf4c2d0a60f15cb9be93f2cfaa65c8b7761cdbf881b0e3332e24a2997f9bd120e63a6ba57e0222156139a8f0ca42398209264257f861ec064f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+4KU:LJ0TAz6Mte4A+aaZx8EnCGVu43
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4352-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c84-13.dat upx behavioral2/memory/4352-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c23e879fc80d37b50d1af94143ce37813e010422e4a5d7543b5eaa4c08925973.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bfe7e0a5a9ebbcee544fc11c5acda590
SHA1a70043dfb774d559e2aaed4480791d9c331c257a
SHA2560edff3877344004cfde70b6eea16cecb1c631e240d514da3cafec9a5dfc7748f
SHA51270168fff8331a1221907a5d461148ec138800cf21cf0325b400b061dc1ef062dc6473a3ef92166f559b2cc10467be4baa3e6eefdb1b28a92cf2e9d11f34ed518