Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:07
Behavioral task
behavioral1
Sample
26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
Resource
win7-20240903-en
General
-
Target
26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
-
Size
83KB
-
MD5
844e83ddcedf82e9c806f583a47d970f
-
SHA1
da2366a3dc46d0068d3ae79960adaa1ee724c9fb
-
SHA256
26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c
-
SHA512
11199180aba0aa3f5fb12916ccca47f9db9784703fa54c4c3ab0535c970360580e1d0fcf434ce346600d14f4a252691031b4d1c5fe6a517b0073c8abbbbafdbe
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YKO:LJ0TAz6Mte4A+aaZx8EnCGVuYv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1752-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1752-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1752-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1752-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b8b-12.dat upx behavioral2/memory/1752-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1752-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5c43e7e8aa92623e9545750ce9024838e
SHA1c34fe4e585660d6d75e715d4d725995cc0882a2b
SHA256df8aa3c984a95e2073347c2ad3f026ea085558870ed9b45e895c0cb29ed75f74
SHA512722d5f1c9c23c4784f478cb7381a41ddc9fd3222c4d079f4bc3510c02e01bcc4612f316c525151cdfbeaf4de3be08e2b6a1b7b07ac3b1989765d5eac5091461c