Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:45
Behavioral task
behavioral1
Sample
ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc.exe
Resource
win7-20240903-en
General
-
Target
ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc.exe
-
Size
83KB
-
MD5
0b04ca6fe5d7d1e7ec82d594bc34747b
-
SHA1
34876cc41d848930809b76fcc9821c0bae3189e2
-
SHA256
ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc
-
SHA512
e050c3ae5b8e4d90567403c70079174ded0c8a905587894ef4755cb8d18f21f4755ae6f9894a772417f2c39538adb0e516039b1a0458850eb919c91d99d0bcfc
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+WKK:LJ0TAz6Mte4A+aaZx8EnCGVuWX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/544-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cc3-11.dat upx behavioral2/memory/544-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-27-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddb6814c9345ebd3efb32268ee9e586534e091bdc8d1cd96319c1e23114049cc.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f3f451858cbd85346a7a119f0ea0f7ea
SHA110d7776b9c0dba9f67460ac8c19ec79884717cf9
SHA25626373d23b5830a9776064209a534e39feca2e56edc41f4504b89574de853687e
SHA5126ff273d10f2f89fddbe1961cc06e4f89255e7d9e06810dd15beb5d09920f283b7ac492e81adec3d4ea9300b5c493fabb0c9ee0789b9f02e54b68736b261bdf5f