Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:06
Behavioral task
behavioral1
Sample
e8c406a15ea6602ea585eb7922a80d073c6a3cc4ede0d3c2843041ffa2e0c2e0.exe
Resource
win7-20240903-en
General
-
Target
e8c406a15ea6602ea585eb7922a80d073c6a3cc4ede0d3c2843041ffa2e0c2e0.exe
-
Size
83KB
-
MD5
704753ac7fb5ce4195feeb4ebf962a48
-
SHA1
b92fffceceaf0c296c0e36c7d24a232b99a6275f
-
SHA256
e8c406a15ea6602ea585eb7922a80d073c6a3cc4ede0d3c2843041ffa2e0c2e0
-
SHA512
cd889664c8f2f0b511a6bcf197bb42911f9a4e7ccba65d76c7a4fd4e8f852aef348b40e45e9f286593704df9797ffe572efef0932b8e15ff240a93855b68356d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5KK:LJ0TAz6Mte4A+aaZx8EnCGVu5V
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4976-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000300000001e646-12.dat upx behavioral2/memory/4976-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-22-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-29-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8c406a15ea6602ea585eb7922a80d073c6a3cc4ede0d3c2843041ffa2e0c2e0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5de317700a395cd9e7251e18a26b0c09a
SHA1f25fe7afdfabbff80dd22bf6e15d5840b763b031
SHA25603a3643425a131c5d74f4306ff0f13ebd4172c86b896e4dc8cd3d09dbf4edfb1
SHA5120970ac8b9428bdb6b69a184bfef8d8f7e022b5b4ed77fb0e237e0d599f632afdf96f346185abd5319add28ab6d7029c2f06c964d8bab5aec6347cb60c2206aa0