Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 02:28
Behavioral task
behavioral1
Sample
a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe
Resource
win7-20240903-en
General
-
Target
a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe
-
Size
83KB
-
MD5
a69fba4b864eda9e83916804bd5a9150
-
SHA1
c8fd6ec30f3b5c9178fd3df8bfca9de0e29770c6
-
SHA256
a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943
-
SHA512
d2c7b582a3f59cb89df364da3800fe5a42db23f3f5f6d8f248a0970c447be108cf352c21987f6937808a8566f11de9aa7e545af542d70938a780b913b6fc4752
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+NK:LJ0TAz6Mte4A+aaZx8EnCGVuN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3880-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3880-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3880-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cd1-12.dat upx behavioral2/memory/3880-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3880-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1afc7baa60815e0146d0c59adba5d84588eea6e690eefa3e076492041c05943N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD53734237c90ddcae45d36b6a09ba931b0
SHA10905b2ab011dffbb073bd128a41037002396f31f
SHA2566eccb659ed976674073aeeb34c2ecd91a1e9264955ac1a4ca53b3bf80d59ffdc
SHA512906a15476fe88d129184e115fee0094431129d73bebade4871449f82ef0c79d6a0593763fd9861cabefad14ccec0e9942715f70f54d8dd12b9ead4795d6d1dcc