Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:50
Behavioral task
behavioral1
Sample
20c3ce95afd7451e0fd6796736b15b5b7711ce8bcfbc6001ccb9db1393707de0N.exe
Resource
win7-20240903-en
General
-
Target
20c3ce95afd7451e0fd6796736b15b5b7711ce8bcfbc6001ccb9db1393707de0N.exe
-
Size
83KB
-
MD5
bce4f7379268a158f8f1f7b48a5b11b0
-
SHA1
38f9ab10efc7124a46e04876c712e0987dac2517
-
SHA256
20c3ce95afd7451e0fd6796736b15b5b7711ce8bcfbc6001ccb9db1393707de0
-
SHA512
b511340490acb554b7a5dc6e7289d258aee112e251b889dfcaa414afd7162cd86155427f901ac80b65bd6c2bc1ad10cd13737177eaf46d83ff111936f9bdff93
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+pK:LJ0TAz6Mte4A+aaZx8EnCGVup
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3856-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3856-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3856-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3856-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b87-12.dat upx behavioral2/memory/3856-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3856-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20c3ce95afd7451e0fd6796736b15b5b7711ce8bcfbc6001ccb9db1393707de0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD51c8dd08a392037f5371a15c0d2d61ee8
SHA11e623b57cfe24ec1bd190d8f557ab046d6397598
SHA25623e3c0430aa4a6ab8ec63efe2449c55efb22665473ad60a22bcc97776c35b3f0
SHA512cfb4c5f6df42c8de9ccf1fe06981ce630623f8e289c1cace8b743050320edca9b2e8043ad331085efd6683a69068c8dfc78ac776d99882d4d2df0ab9f320e932