Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:06
Behavioral task
behavioral1
Sample
b8fa40aed313e55323985d1e3a2183b8b99f0202254eaae46ccb15ef2b420c61N.exe
Resource
win7-20240708-en
General
-
Target
b8fa40aed313e55323985d1e3a2183b8b99f0202254eaae46ccb15ef2b420c61N.exe
-
Size
83KB
-
MD5
519554a5416e04b1845bb0ce632d2310
-
SHA1
7f4403eaa968bf85821b6dfde3b2e57fc688d65c
-
SHA256
b8fa40aed313e55323985d1e3a2183b8b99f0202254eaae46ccb15ef2b420c61
-
SHA512
e267935101c7f94c41121083b46488f24c0bb23bfc65282272cccd063062f6607aea17eea4736865a1f2f1180363b8c6f67327640c4e87daec6fa39780943de4
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iKa:LJ0TAz6Mte4A+aaZx8EnCGVuiN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1888-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1888-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1888-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1888-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cc2-12.dat upx behavioral2/memory/1888-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1888-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8fa40aed313e55323985d1e3a2183b8b99f0202254eaae46ccb15ef2b420c61N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5116d788be31eb2e08fc2dc45205cd85d
SHA18c910ff5283720485ac0022b7bff1a0cab25ca07
SHA25654e8cf6232afb0b9d10a8a0ab1972bd67948743e7e849a0e64c103440ca39c6d
SHA512c455345acb5f0e29368c03898d66ad57a1af450bba321d2419548e714aa5ed37fe72bf4b5368ac0d5e76360b16a0096ebcc7252f6f0582a7e8a278fd068d4752