Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:13
Behavioral task
behavioral1
Sample
a54405f24cfddf4b016a9095706df87ce134105856adb9a5700cec945e180d7cN.exe
Resource
win7-20240903-en
General
-
Target
a54405f24cfddf4b016a9095706df87ce134105856adb9a5700cec945e180d7cN.exe
-
Size
83KB
-
MD5
994029822a145b55e20599608e8e34b0
-
SHA1
7747b5dba987cfc34ffddeaf79738cf1ba56d0f4
-
SHA256
a54405f24cfddf4b016a9095706df87ce134105856adb9a5700cec945e180d7c
-
SHA512
f1f9d0c76dfd969fda902b0d2d8465baf583e30687bb4e8dc615a828cbf02532910fbb6e67a638ee4111af51cb42b4d1da54b7301e368e37c522ade022f8f957
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EKq:LJ0TAz6Mte4A+aaZx8EnCGVuEF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4332-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4332-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4332-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4332-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4332-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cde-12.dat upx behavioral2/memory/4332-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4332-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a54405f24cfddf4b016a9095706df87ce134105856adb9a5700cec945e180d7cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5e114ef1c4c5333c17c2a7db789d2cfaa
SHA1e0dc7a7aed11811fddf22cffd59eeb449f4ef540
SHA2565f2204a37c2f2702420937a83c94c5f1a0c342bfc5cd15634ffe1c4fc8c8e8dc
SHA5122651c4d964d8dacc23745f0af3f6bb3996d541b82ad108bcbfba0c61c0d963c717bf404b1844a3d42e51af1bc41f9c7a5495bd207d58189dcfab97f6fffaa001