Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:00
Behavioral task
behavioral1
Sample
0c800e92b07670df49e01e33358d58a6c15e6b2d7d452de2fd6f7a62e4d395d4.exe
Resource
win7-20240903-en
General
-
Target
0c800e92b07670df49e01e33358d58a6c15e6b2d7d452de2fd6f7a62e4d395d4.exe
-
Size
83KB
-
MD5
436f131db3f6ed476e465e6b655f9440
-
SHA1
650896297dd43b19110f6296147f8f9831b6c954
-
SHA256
0c800e92b07670df49e01e33358d58a6c15e6b2d7d452de2fd6f7a62e4d395d4
-
SHA512
381d6a8462b4c98efdb0d73347cc02b97187749787146b09d36a568c167540952905150d25c6b87e8562aeed2bfdf9283764e8b99f51ade0377d4fa486d28eb3
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0KK:LJ0TAz6Mte4A+aaZx8EnCGVu01
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5068-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5068-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5068-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5068-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cbf-12.dat upx behavioral2/memory/5068-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5068-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c800e92b07670df49e01e33358d58a6c15e6b2d7d452de2fd6f7a62e4d395d4.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5536c30a05ee1e9ab1f17fda7579a1115
SHA14ee9d774f5e04ca8af131245903bf296438a938f
SHA256046995a3eddfbeddcc6f415db70dfafecd7ac9ad8c6208b3c2a96d1044201a2f
SHA51218b02cff45fbd3cae2e5f61c9dd4b339650d93934cdffbb303bad312226a1bf4c519423c2c05cca5648f7f4b265df8a4e3b18889249e7d0d5b6532c5ab1a3921