Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:06
Behavioral task
behavioral1
Sample
4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe
Resource
win7-20240903-en
General
-
Target
4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe
-
Size
83KB
-
MD5
c21c4df6c871492e09a0c462fc9b6220
-
SHA1
6eea9bd5c7455e1de0415f2f0a47c5cf7c60ffbc
-
SHA256
4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3b
-
SHA512
41b67d3b3bd8871d4e4ef42fb790e8f94859c39d8109c3bf7cf63b62f61d7e4ce65730c221f366fa694fe6be203769f1bd15d93af52fa6748911b8fdb3009caa
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+6K+:LJ0TAz6Mte4A+aaZx8EnCGVu6n
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4316-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb4-12.dat upx behavioral2/memory/4316-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4219e91bd63e20bad0256da0b25f01af4f94c6ca9ec565462d10eef0e9e89d3bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a2e268da0b00e6afc019aa7c9b0800ac
SHA1b987f541f978e3f378d23506188598aad571dea4
SHA256b82d9a6805acb22062728f2e96666869b3afcb230bf81fdc64313b8c4e504b86
SHA51281fada67a83b802ebe57ba153c4ef73e44cf452018d8ecec952f2edf1ddb07a30fb47377804c618d2e2710e277f55f6e707d8eb464b0007d608bb117e819cfc8