Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:46
Behavioral task
behavioral1
Sample
eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49N.exe
Resource
win7-20241010-en
General
-
Target
eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49N.exe
-
Size
83KB
-
MD5
b31a2cd63eac9a04d2eba57f7368a220
-
SHA1
e19f2502f64c4bf192fc62267aa1dfed1ca8c1dd
-
SHA256
eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49
-
SHA512
2926ec989d14ddf24f680204e63b39b85856b43dd432539f4eeec7b2df1599852d6858c79c34937a642683d15c393a88ce678dda045068bff23d47ff49a3a47b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+dK+:LJ0TAz6Mte4A+aaZx8EnCGVudH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/644-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/644-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/644-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/644-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023ca8-12.dat upx behavioral2/memory/644-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/644-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eca271630a3276ed8100efd649f87b34dcdec0b10c08c9495b8047a0b89aec49N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56786f4972c788d332659acaf6cb9d74e
SHA12f251674a61e01968b88b9fc72072ec34cf68db5
SHA256260adca042ba8f340230495c4b595b9e5e9d63c91d5bdafb357293c5d597f092
SHA512d87565da564dd3d502d45c544f2a9ac7021e716f20deab63e0a5dcfd48108822953675fe87d09591b27c2242666df0a92f7f6934686c1b4adeffec7eebae134c