Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:15
Behavioral task
behavioral1
Sample
49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ecN.exe
Resource
win7-20240903-en
General
-
Target
49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ecN.exe
-
Size
83KB
-
MD5
451dd4a652a8deea5f5d2d03162f7a80
-
SHA1
c3c411e4b4c7bd6e118e436d25669f00e9ab3645
-
SHA256
49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ec
-
SHA512
b227790b11f53a2e0c75fe93481cab1a1e0e3efbfdf87584a783041c6beba85d53ed18a10fa94fa5c818a2635d98c231baaa1fb79f8b27cdc9be08c2844a4f78
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+kK+:LJ0TAz6Mte4A+aaZx8EnCGVukH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2384-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b72-12.dat upx behavioral2/memory/2384-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49796872e4d54b6ab3440dfd71b97e33c55b73a8bf63a9a79ce6fe77729da0ecN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f5e3ed3d490f152f46eb26c0590d0810
SHA1198424c9d065584123609710da378ac540c6a7a6
SHA25662c05972648383e0cac23dcd098d50e80d088910f1ed0224a7711c58bc8273df
SHA512d55c723e6298bd499258c0e035363874b1f3c37a7b423f29f78e836a64c7422625b2feaf783c2f2e32f9cce19cd03eed6c3bceb05afc8f3485eb30e869ab56e6