Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:28
Behavioral task
behavioral1
Sample
890f3abb614c73bb92ba26acfcbe5d79a251c8eb0f230ada5dfc64383444786fN.exe
Resource
win7-20240903-en
General
-
Target
890f3abb614c73bb92ba26acfcbe5d79a251c8eb0f230ada5dfc64383444786fN.exe
-
Size
83KB
-
MD5
22b46a962b8b5c8fdd0dadfa9945b150
-
SHA1
f3aa35194e7a57987d88b2b264627e76d3e52228
-
SHA256
890f3abb614c73bb92ba26acfcbe5d79a251c8eb0f230ada5dfc64383444786f
-
SHA512
4e367cdd86fedec89e25c9824e24a3621d24af68880047b3005422f1380d6597144b4c627c05d472f67f4da75df5baf60e208735101912c9a659c1d462ea1e05
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TK:LJ0TAz6Mte4A+aaZx8EnCGVuT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1224-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1224-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1224-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cc6-12.dat upx behavioral2/memory/1224-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1224-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 890f3abb614c73bb92ba26acfcbe5d79a251c8eb0f230ada5dfc64383444786fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD590f15f634911eb458e1ae1d4ec487c2e
SHA1e6d0c5468403c6ce0c185bb5f8cc587ec331fb64
SHA256701279c97685e4a72db2aa1c29ab84767180d3f8e39bd527441f1b2cd4965fd9
SHA51253e5c764d78e95b1e3ec42e63509f204211b95233fc1dd4d8f58d7c5f73ac48081306927238bfefe13e3b1444aa6ea8b3caff4d646242d8e6bfd09bf68883a67