Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:45
Behavioral task
behavioral1
Sample
d55a870398f8805d82b8d83e4b6a256182161254331038f319d21041648d4063.exe
Resource
win7-20240729-en
General
-
Target
d55a870398f8805d82b8d83e4b6a256182161254331038f319d21041648d4063.exe
-
Size
83KB
-
MD5
b2bc063461e2ddedd48290861b4972a2
-
SHA1
34897d8c57c3c174b58192a6c5002d4480eb187a
-
SHA256
d55a870398f8805d82b8d83e4b6a256182161254331038f319d21041648d4063
-
SHA512
ecb106fd7be7fa9a30992e8396fc25f16a2c6a494a3e66e325b1b377dfbc56480c66c32ea7b96bd115a4e2d779118cd2687a1628a5d96a558d146b0c7eb09be6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iKO:LJ0TAz6Mte4A+aaZx8EnCGVuiv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2252-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2252-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2252-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2252-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c8d-12.dat upx behavioral2/memory/2252-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2252-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d55a870398f8805d82b8d83e4b6a256182161254331038f319d21041648d4063.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD569fbf9a2c2a784900fdcd5c2c9e3173e
SHA1b93abe80f1e87e74392d5527efa2790fe400c433
SHA256f09f10ac125d9a2506e89435045d4220f00bb7853acbba89c059328001c6a0e9
SHA512f95d6940fd1cb05c38419fd70fdccada0cbdc3a64a5b7cd79e2d7b64008b3cc4a8a366d3126f5a1ce43742dce9e5537f681fff28f317b862df40daf5930df0ef