Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:32
Behavioral task
behavioral1
Sample
83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654N.exe
Resource
win7-20240903-en
General
-
Target
83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654N.exe
-
Size
83KB
-
MD5
410bb12ba1f003eed5b20cae84fef890
-
SHA1
8e936640205bc2dbe540579d63646e8e2747e15c
-
SHA256
83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654
-
SHA512
69e91085189dff0a9464e26f7cc47f66875c4176348487ca96027dd7b11e1cc00800d7fda357cb89fe4b9d5df4339dda6b9a2b917e89e0041ce9fd257207d323
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3092-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3092-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3092-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3092-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023c0f-13.dat upx behavioral2/memory/3092-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3092-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83d408f7a4dbbd4f0739906d7e5ea0661145e28714aa460b6c26fc4498c9c654N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59bfca1cceefbb27293fa2bd77f1709dc
SHA1b15a5b21eb4645a33d68a8cdfa8cc56992628f45
SHA256c7f2daf33f49c489cf55498b654854668342faace2722a53910cee1016a43d32
SHA512c527d66d76a446935a8f502b6280aeb2bcfd6bce800c218f548687dadf95d7c890af5f866739ec1665eacda7b036a0ba91e5566901aef51af632cf10e7f2b39f