Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:25
Behavioral task
behavioral1
Sample
20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe
Resource
win7-20240903-en
General
-
Target
20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe
-
Size
83KB
-
MD5
f2e18fd2ffac3293fc0e44156ac82c10
-
SHA1
4df8ba5adacd9feed0d416d1295c61eea6f89d6d
-
SHA256
20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4b
-
SHA512
4e344139da0e71dd38873511d8968083a15e8363e2150828aef8602d35c488ed64ffb17520b1e98ed6c8282cb154b1bb52585e3e7e97bb76f61986667919ad9d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1956-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1956-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1956-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1956-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cd1-12.dat upx behavioral2/memory/1956-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1956-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20ec5a2c7f919a06351dbc00202c7d2a4c2dd94adebbca963e08df76f105cb4bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD589e1210e1bb2d5d9995322f673cb90a2
SHA1925de62a399c1f30697c22ba17289c1fef7f21b8
SHA2565315e623ca6f34da05049c063d0838c5ce03a2e2659b07012d4ddf457f9daf91
SHA512a959b5a0c37872b749823fe75395064363b19363da4d58209383578bf5c2a00a51444fe3a989947cd829bb96d4c27b9797d6defde94e57e8ab0c6c76eb397b8e