Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:13
Behavioral task
behavioral1
Sample
25e9d40eaa13caca7dd96b4f59d26456d02218a5d9f89ba098082ed365720857N.exe
Resource
win7-20240729-en
General
-
Target
25e9d40eaa13caca7dd96b4f59d26456d02218a5d9f89ba098082ed365720857N.exe
-
Size
83KB
-
MD5
0bd99fc8d9bea5f91bc3bb3ba461c190
-
SHA1
b84389e2269f090bca09c57fd9d4baa5e62a744d
-
SHA256
25e9d40eaa13caca7dd96b4f59d26456d02218a5d9f89ba098082ed365720857
-
SHA512
4f2cb639d1b12fb79d2fd24f9c41d1eeb68ed37a9c4eab5f3dad14c4408adf6d8869aa49f14de024f90ffac842ec1e32fa83a9bedc1e26ac61349521c5300eea
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+wKK:LJ0TAz6Mte4A+aaZx8EnCGVuw1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4132-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cb1-12.dat upx behavioral2/memory/4132-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4132-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25e9d40eaa13caca7dd96b4f59d26456d02218a5d9f89ba098082ed365720857N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD534e97c32d2ea5e5533e94cf9cbae5d85
SHA10aae7a0ad89f05438ee04d33d372074b44f642ba
SHA2562bee174811dbfb35c5a37399b55c753600c1b721c5a9454e942c22d556615138
SHA512c508fef8f089a117b85622ad6ad8601f12892bf18c06035009b15dce95607f185a72d4b4bbb0127163a5d14584e129cad7eee9f869331b8a227ea1140ca22cdc