Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 08:50
Behavioral task
behavioral1
Sample
46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0.exe
Resource
win7-20241010-en
General
-
Target
46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0.exe
-
Size
83KB
-
MD5
890ef64c30e8dde2c23f656a38659e72
-
SHA1
18035135d15b4712a6e37c0389a34ad40e85a95b
-
SHA256
46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0
-
SHA512
82e12962f98bcab7f6dd758a9b7ab1cf7660433043f703c10b6a7023ba1d5a1d26a767cda81689c11e0d1997e27b6fbe9a7c81dd84e945f6f32304aec2bd2cef
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+hKe:LJ0TAz6Mte4A+aaZx8EnCGVuhX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2180-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2180-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2180-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2180-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c94-11.dat upx behavioral2/memory/2180-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2180-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46e4d9c61644235388518a6889652c3eb18feec21ebdb55642d242327eb3e8f0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD571417df9ed056b836ed09247057aaaea
SHA1262bcbbe30d3abafcf4f8d5238a799c31c721c3e
SHA256ff7542a70cabaf1fc50c52f815cf7587b7bac1ae04e445a3beaaec37b3cba056
SHA51232a9547c8d9f73f57a9c4d6546348452c06d37e077110ff5c0192505fc80ea15a71d172ebae3418acd58026d3c1d6bc42ab8e573e6c9b69d8237b36018a3494e