Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:10
Behavioral task
behavioral1
Sample
3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe
Resource
win7-20240903-en
General
-
Target
3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe
-
Size
83KB
-
MD5
23618ba669d5cf725afeeb6a6501dae0
-
SHA1
0c1a0b33125fc1e54b45281bc94165b46ee88dba
-
SHA256
3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e
-
SHA512
e8686b9c12f46a9db8e49595a03a08bb508f325d4f1c7498cca0f4cfbe0fbedb28c06825797045c28b4de0872772a11592a5741c90c02f06e68963fcab04c404
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+nKy:LJ0TAz6Mte4A+aaZx8EnCGVunt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3364-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b83-12.dat upx behavioral2/memory/3364-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3364-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fb704362f984894e7831a7e590d8def4889961e9fb86a39572d41727da3406e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5807db9bc5928b094c4192877b9137c7d
SHA1ebd7014e9bd9f87883d48e6f759a39aa50c3a64c
SHA2567e6dfeb8a97a4c87c9f3af95e31bb553d9ff680326ca311529bc27847b91576b
SHA512a5a31166169ad56644f65e15d99973520164c0209f67b9708fd6b7f6078eed0dc0d3497ae37a718fa8ca7d28abf12a1b003b5decc4db6051f0ea2335e4d95857