Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:18
Behavioral task
behavioral1
Sample
ef7e6bca46315e0698d3135f374380daf6ec97ef29899b8a042553c5a78c1b6e.exe
Resource
win7-20241010-en
General
-
Target
ef7e6bca46315e0698d3135f374380daf6ec97ef29899b8a042553c5a78c1b6e.exe
-
Size
83KB
-
MD5
00fa0ebdcab04b15a534d0b657c4ba18
-
SHA1
5f6659503cfd355080267506edca31391a7a50fb
-
SHA256
ef7e6bca46315e0698d3135f374380daf6ec97ef29899b8a042553c5a78c1b6e
-
SHA512
57b8e5f83ac2792aca88a29ca0af67ccdc1d5103c58ada0fc538f2584e800c6cb80e05ac939d56b7297a19e0abc03f00050b262b18707445ddbc88ab92f421a1
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+DKa:LJ0TAz6Mte4A+aaZx8EnCGVuDN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4004-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cac-13.dat upx behavioral2/memory/4004-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-30-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef7e6bca46315e0698d3135f374380daf6ec97ef29899b8a042553c5a78c1b6e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD50edd2b6c563b6f834a138b8efd5e359a
SHA1587fbb0a38402f60bb0ed6d069eaa8f143f22cdc
SHA256f69a9736a3a878f57a68329c5e37a829524006930edcbea32d4c7ee292c02bf1
SHA512f18acd682e95d3d748aa3b7ac79a194e4127df66f3df0344652452e76e292db4d36755a68541668c207caac296a541fdd3c9ba457f04b2c8e3b39054e26ded87