Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 04:48
Behavioral task
behavioral1
Sample
6505f3d900e4a056c48ea12a395561f2ba05beab4feb114df5da1f3f6bd4fda5N.exe
Resource
win7-20241010-en
General
-
Target
6505f3d900e4a056c48ea12a395561f2ba05beab4feb114df5da1f3f6bd4fda5N.exe
-
Size
83KB
-
MD5
ad99ea76a30a5f6957b15373eccf5190
-
SHA1
93b2ca8e5054f42012605ea2f55170497e9a1048
-
SHA256
6505f3d900e4a056c48ea12a395561f2ba05beab4feb114df5da1f3f6bd4fda5
-
SHA512
0da1d67b392efd25eb35bba8c65482342c93978d6de682337d76c179d9ddccc4b783102e87cc7707a4719ef15dd3d6e5fa53ca638c4d17e6b292bd57ecf27867
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2672-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2672-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2672-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2672-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023bad-12.dat upx behavioral2/memory/2672-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2672-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6505f3d900e4a056c48ea12a395561f2ba05beab4feb114df5da1f3f6bd4fda5N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bb867427b7b8f111bf5d4776d4cc628f
SHA19696e63063528d9f40feb38cfb188d27ceaa6a52
SHA25617bcfd36e9940a0aefdb10811b6ffaa61ba049dbd4841041e4af81ebcd195361
SHA512c3f42281888a31c26783034cefaa40ef01c7d9edfe9cfabc42b73bc82110a7cd5b0ebc25ba67cc22ec1f0ea04311ff0402719820bd20225ae28b148b6b1fec5d