Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 05:15
Behavioral task
behavioral1
Sample
861810d32893b282d594834e028a8ef78a585320c29ea1fad433fa065fa2202cN.exe
Resource
win7-20240903-en
General
-
Target
861810d32893b282d594834e028a8ef78a585320c29ea1fad433fa065fa2202cN.exe
-
Size
83KB
-
MD5
0800e4b1ac5f99d50104a64f26a68780
-
SHA1
d43a9a26824b22984e1b39d974675611515e30d2
-
SHA256
861810d32893b282d594834e028a8ef78a585320c29ea1fad433fa065fa2202c
-
SHA512
0761e21b99bcb72d2a97da2ecb44c854516dadf9bd8212b8ffe708d8b64ea5504de3ecedc7fff85f88a297a2fa47e0f4423fbad628a05b802893e8d0b282fc23
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK6:LJ0TAz6Mte4A+aaZx8EnCGVuR9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4024-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cc1-12.dat upx behavioral2/memory/4024-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861810d32893b282d594834e028a8ef78a585320c29ea1fad433fa065fa2202cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5ecb97f7f36688d82435d5c13e5e9ef9b
SHA1b2c5f3e243f857d3e48ae8c77e6141516e38e5e8
SHA2562d6be3cfb7a90cd791ec97926bb1ef33dbd2fef58d6c4149138bb29e39fb0a3e
SHA5124ba2ce8d3eb090dbe3fc4deb8a950eb7a9263f231ce06764a9f4622e0ddd2ba0bb0e28b3816fb2d78630c435350c23c0550e3d57236e4fcf00da65d5d462bc24