Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:06
Behavioral task
behavioral1
Sample
bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8N.exe
Resource
win7-20240903-en
General
-
Target
bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8N.exe
-
Size
83KB
-
MD5
a40987956eafd395dc35ad6a14708880
-
SHA1
132ee1bbf25c83d94453fa0c628fb079170e9cb0
-
SHA256
bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8
-
SHA512
79ba7f5fa5a0230dbcf6554a54358a0e75e871110a7dfbde7ef55a614e7355a95f7b57dc55b96552b026375cdd9eb19fd69173d09eef7adc6892685dc48cd623
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yKu:LJ0TAz6Mte4A+aaZx8EnCGVuy/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1584-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1584-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1584-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1584-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c000000023b52-12.dat upx behavioral2/memory/1584-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1584-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf513ba02a3b436fd61b423d54e9c852990280d4df098235e1121be3d5003ee8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5e858462ad37bc819ec197ae2c3cfcb73
SHA1c412104e3399b721910f2f35a1730f4c7d99de39
SHA2564a5e0ae16d8b1bfc060632009d13fd15f20c4467b26cfe43e9832151dc76f119
SHA5129cae77c7f2b3a6e2a6cd3b7288d38e1c9b8579e4966b27576db826f5d9699d699ecc617024e8e136fcae2c940741fc45bb9d04100429030ad728eaca3129bfa9