Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:17
Behavioral task
behavioral1
Sample
e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5N.exe
Resource
win7-20240708-en
General
-
Target
e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5N.exe
-
Size
83KB
-
MD5
91480ae95f15be7001b45f26136c7140
-
SHA1
5d7cc0e28c6ed5f2c0eadfda6f7afac144f4892e
-
SHA256
e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5
-
SHA512
264b204e6cd0473ee133a9e94dc0b878abfd20354faeb2fbb99d9ee42e90f2c248476a38a52ed0834df709cf223276238c4c116d9ab6a330ec659d5d50d68b7f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+GKu:LJ0TAz6Mte4A+aaZx8EnCGVuGf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3872-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023c0a-12.dat upx behavioral2/memory/3872-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3872-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e24cc096abae0c17e5b9baba8fd3815dcb111aa24ef1ee3610fbc90ea28976b5N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d19bbaff88014135d26ea76328d7fced
SHA12f48b8851ef436d07e20d825e5301ee90d804d3c
SHA2567a2b89dface70eaf8104850242729de97221bbbc63c9316dab83164d8f20168e
SHA51246e571b428f88aff2202326e0bc024bf1798ace7515ff52c77d45833f45f117442bf6d5ab51ceed581f62a14c64ce810b9a62b1e218ac46cdf9c0db2cd8f556b