Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:16
Behavioral task
behavioral1
Sample
89e9f68650c6c9881d0cfe7fb0257d8c4515b657816ce291a61b6d73789ba91fN.exe
Resource
win7-20240903-en
General
-
Target
89e9f68650c6c9881d0cfe7fb0257d8c4515b657816ce291a61b6d73789ba91fN.exe
-
Size
83KB
-
MD5
3bbf25f480dcbd5fea971f769db6c490
-
SHA1
695a48e9269a47f1f7f75545666ee51dbed21673
-
SHA256
89e9f68650c6c9881d0cfe7fb0257d8c4515b657816ce291a61b6d73789ba91f
-
SHA512
c70856b36f960526f4918462c2fd220ef4eca5c53f9cf78d81befdf92c7b98f56d578550e55c1f710130d8745fe3e319d6fea4a72546d2e025d352f80db9de54
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+6K6:LJ0TAz6Mte4A+aaZx8EnCGVu69
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/728-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/728-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/728-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/728-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c9c-12.dat upx behavioral2/memory/728-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/728-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89e9f68650c6c9881d0cfe7fb0257d8c4515b657816ce291a61b6d73789ba91fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52210c13856a4a98997a08675a831bfed
SHA126516c92519c6e7db17f828877db8f392c0cdd01
SHA2567d572bfa74862c5bff7d5bd968c9624776c0422a5fad15d14fd7551c7463ac2f
SHA512afb18cec7a63a770ef258177a3b1bc27886bffc2aaced5bdd18f58e605b30f4ee1426800f8c191d31364ff7a4c18cc9321772c87b25a8543abeb23727c52eb91