Analysis
-
max time kernel
111s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:43
Behavioral task
behavioral1
Sample
dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688.exe
Resource
win7-20240903-en
General
-
Target
dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688.exe
-
Size
83KB
-
MD5
b99d56c370edd67f6f931b8c70907386
-
SHA1
4ee9fa40e440a89156ecb59be74c4faea7029444
-
SHA256
dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688
-
SHA512
adb8107a46865081deeebe95b914e0caaca82216932ecb02f81e77b187f5d5262d2b07ebf840ad14817f22b6de5959df0f664b19d4cbb5d179cfebf8dd4f492a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rKa:LJ0TAz6Mte4A+aaZx8EnCGVurN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3792-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3792-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3792-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c81-12.dat upx behavioral2/memory/3792-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3792-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcd3c4ca59233143e3fc6088a73a1efd6b9093b2cf903fef7f88381609afc688.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59c8fb5fad646aeeca31e6563717b2fa5
SHA14b7282ad74342e45d5003b681122528638803fe2
SHA256636c5adcd27e858a99555d5572339831e0010a096cf89c3e0a0b6dd0329fa6d7
SHA5127dfe230e24794011868ab7d69f1370cb94a898626f74aa95da8c0085d29c01e3fdc10c8e8b8ca454120e3c36cc570cc9d8a6c692cbd5396dee21f9f0d049b35e