Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:10
Behavioral task
behavioral1
Sample
5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccdN.exe
Resource
win7-20241023-en
General
-
Target
5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccdN.exe
-
Size
83KB
-
MD5
652bee01d9191bc3838b79a700499860
-
SHA1
1d79c9b59a9cfb31cc2fb56e1be791945f25defc
-
SHA256
5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccd
-
SHA512
020cee162905c2190d8940edef7fad745507f76a3d57b3d1dab6b9dfe6895f5b92d2888b551904ae511c3abffdfa02724e1bdddce9158530a25211cb1446795f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+gK:LJ0TAz6Mte4A+aaZx8EnCGVug
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4060-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4060-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4060-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4060-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c93-13.dat upx behavioral2/memory/4060-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4060-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d50b49ded452075d162a766679d47b05f74320740aa5fe28facbf540bfa2ccdN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5480c93be77b633ffe717359f9002108c
SHA1752868bcda9fe8359391b64bb276510661e0ccd0
SHA2563df484700b70deb5a01b2d78b1366ba22f852a26b05586f4f3cac48e1ef8b0b6
SHA512ec3793eadd0c41971c655d9326bb8d7817379f7ee921235c31c6e31839e37e61980eb53aa923ae3a8093273257e4ee39aecb680713cbabe5865c6e39038eab17