Analysis
-
max time kernel
111s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:14
Behavioral task
behavioral1
Sample
ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987eN.exe
Resource
win7-20240708-en
General
-
Target
ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987eN.exe
-
Size
83KB
-
MD5
4034032b03f635e2750ed9b93d97de20
-
SHA1
c7a50b90004a752932dab0e2cfa4e56efdcbf989
-
SHA256
ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987e
-
SHA512
0405c27464256a2a13a030958933327926ac0f5d6e32930ed63a6a2c9eb6e1cf1936af8e7fd1a6162c25ec7b0ae1a5dbfb1badec92ea2cda558e6d1a16df28b1
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+LKK:LJ0TAz6Mte4A+aaZx8EnCGVuL1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/336-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/336-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/336-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/336-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000c0000000218b4-12.dat upx behavioral2/memory/336-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/336-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ede3c77e04e8854ac5ffb2e6f106f02bb333d676c288112a18eeb8313db0987eN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5469b6315ab86f4c7cd067707abca84ae
SHA130163067679b252f184b4c7466343f4aec620126
SHA25615086c32a75950c796ba25d1518b836f90e83d44a55474f616c9154c2f4134be
SHA512f829ea12183bfd07c14bceb07a773cc68fc894a22526618043f363f6513c7f75ce40faab1a49c40cfaac7c8a6a8747da30caa056b9b79e1eb429acd001e6ab61