Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:04
Behavioral task
behavioral1
Sample
53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edbN.exe
Resource
win7-20240903-en
General
-
Target
53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edbN.exe
-
Size
83KB
-
MD5
92a142cc071194188a72e48a925022a0
-
SHA1
8738c079b107c73d9140fb9a07c46aa25aa40773
-
SHA256
53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edb
-
SHA512
24823ab3b48357b50d4d4e741d076272d29948636dcc2aedb3c52211e73b62c1ca399227210e7b2e66f99bb6f71346397a3a15386af3b59e051453e736894634
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK8:LJ0TAz6Mte4A+aaZx8EnCGVuft
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2368-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2368-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2368-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2368-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000a000000023bc2-12.dat upx behavioral2/memory/2368-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2368-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edbN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD51a610cb1b3e4ce0e29189f15de015dc6
SHA1b402ccc2c5bd699c3cda82992a485430a3d57b69
SHA256e70a34c0788cd8e7fa15bed4a29b8f102d3198a6849a227ef3e5214664e183c8
SHA5124d21086be3e03dff910fe0206a78bf8c57bcf6b09afc3a2b20fb1cd5ac3c95745f135ab2a78dbebbde3ba25a0c68c94f81153348af0ec31babad0afc33b979b4