Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 09:11
Behavioral task
behavioral1
Sample
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
Resource
win7-20240903-en
General
-
Target
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
-
Size
83KB
-
MD5
b04ccd1757587d7efb5c92fe21e8743f
-
SHA1
53d02057046ac9fd42ad815ac34c874d89d35e82
-
SHA256
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5
-
SHA512
ed44e8e32c267873c58f07c5e5de7eb8adcc6f76208b4552ec1dc7656db457f2108cb09aeb88880d94c35f6837559361e0db279de5d62266a3f76e39aa9281ab
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EKt:LJ0TAz6Mte4A+aaZx8EnCGVuEW
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2404-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2404-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2404-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2404-8-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-woB16kxXzenQzv8N.exe upx behavioral2/memory/2404-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2404-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a2bcf4449886a566d262d8448c2ed2f4
SHA180d6c415db7222e070647f1ca67ae124319a1252
SHA25644adf60ae8ee3fc416d079d4c9702ce805b4f8f65490365b86dd35468f00bbbe
SHA512935b817747ae2b24c8a55ebc86daa871a625d882f942733212726bdf221fbe4b82561e8902c9f3d32a3b9810a1fb0a118dc419d8111f12d397fe4177f4808d82