Analysis
-
max time kernel
111s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:07
Behavioral task
behavioral1
Sample
db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4aN.exe
Resource
win7-20240903-en
General
-
Target
db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4aN.exe
-
Size
83KB
-
MD5
4c67fa6435556e21bf2a58be773851e0
-
SHA1
20383f262aa5486101b429d0ea3c29dd108ed413
-
SHA256
db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4a
-
SHA512
80921291ba79699597972d400b5ae8977a374152b558a3d10c488404981070890d436586f770168af57fcc28298e03f1e1333cf2196547ec065b122d18a8ac9b
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+lKe:LJ0TAz6Mte4A+aaZx8EnCGVul3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1016-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023ca1-12.dat upx behavioral2/memory/1016-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db83aac8e0a819f21ede2a5700fe2b6e64288052dce1750a3aa0c15f9a935d4aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cfd3ba24943c1a039c0faa2f789f1dbe
SHA18a6f6533a9b7860dcddadbd12eada4f5fbf3e05e
SHA2568efd3265fb74016a16c3e217b0ab61510b42d30c2f7a12fae253e990ca7a39c1
SHA51217bf38f9a28f473b89f495899ac73ced033a8c9b1e74247dd9979668737a2a5724e812114e9afb20487fac37c4dc4b85faf9638bcf70523ca5404fd9ab83fcc2