Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:43
Behavioral task
behavioral1
Sample
f8ec1d7bbac37c935ea08660cb9e709664843f15c79a53b697cf2def0fb9e7dcN.exe
Resource
win7-20241010-en
General
-
Target
f8ec1d7bbac37c935ea08660cb9e709664843f15c79a53b697cf2def0fb9e7dcN.exe
-
Size
83KB
-
MD5
875fab8692f08fe0ae2f10fb0397dce0
-
SHA1
41f1ec716fa6f5d0551227ed1e7f420cbe8e3ba0
-
SHA256
f8ec1d7bbac37c935ea08660cb9e709664843f15c79a53b697cf2def0fb9e7dc
-
SHA512
66b0ab6884afbd9981fc67e2a8d4ad632ca5b383d8f6613d2f901e7a8e52ddb6f9249b210d318b0b57cf2d03d4ba0616604ed7e5a1a3413611994a2f6e61915f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK6:LJ0TAz6Mte4A+aaZx8EnCGVum9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4028-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023bfa-12.dat upx behavioral2/memory/4028-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ec1d7bbac37c935ea08660cb9e709664843f15c79a53b697cf2def0fb9e7dcN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5794e8daad9526cb1faa116b14ebb4143
SHA102fd27360df6cc4b81cfab4c7a4f24418834f73e
SHA256b23d5e0b5c99a5538ab0e6dab51c6cfb86d1d751f021e92d5e2a3e4c335f238d
SHA5126135700f733fd215babaf439ddc61b905ff89f6d2e7ac0d9d3890938320f1854b44e063bbd2b535bcd9a9eb617e7ee0c4c1cf886a917cff3da455aed247d8a80