Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:05
Behavioral task
behavioral1
Sample
efdad6f580073983966321c89ea3825b97482ad05b2b233394e1180041d58b64N.exe
Resource
win7-20240903-en
General
-
Target
efdad6f580073983966321c89ea3825b97482ad05b2b233394e1180041d58b64N.exe
-
Size
83KB
-
MD5
d4f704841cca25c7e6bbd8a18cf8d850
-
SHA1
9b1f4eefa547cd4785eee34626dff4fa01bcd509
-
SHA256
efdad6f580073983966321c89ea3825b97482ad05b2b233394e1180041d58b64
-
SHA512
a504961fe55bd3e28d3b86c89422e2274a0562fc5f9d4b8066b99619b7e5618135709dc2f4d5e1efc1adfd67573021d06e2f231a97830f0770f4bea56fed062f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5Kd:LJ0TAz6Mte4A+aaZx8EnCGVu5m
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2384-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000300000001e56e-12.dat upx behavioral2/memory/2384-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efdad6f580073983966321c89ea3825b97482ad05b2b233394e1180041d58b64N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57244a4cbeac1af540a52c8cde37a805b
SHA1d99173ba2a4ac34b255981a0048917aebb569605
SHA256414a893daf8262dffbeb9ecd65dff07da2f0c5888659d2c138f89e15f2fe558b
SHA512845fc64fb6819bceb37a6ae792fcd50a8491dba4e67d71b2d79bff6bafc8c0598583e4cfc7e04fb9422a077001f875324c4c05251d9c7e83fa3e96f9efe2a55d