Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:44
Behavioral task
behavioral1
Sample
1b1885b69f9ba801461a4e6affd263acd444983bbdeb2e872723db0ccdf6e736N.exe
Resource
win7-20240903-en
General
-
Target
1b1885b69f9ba801461a4e6affd263acd444983bbdeb2e872723db0ccdf6e736N.exe
-
Size
83KB
-
MD5
679ee4dcb5dfac0fc9a2ddccc8b30d70
-
SHA1
1cc2cd8e489d9bdcae738df29f2b19ae4dcac7e1
-
SHA256
1b1885b69f9ba801461a4e6affd263acd444983bbdeb2e872723db0ccdf6e736
-
SHA512
5f4dd3eb3d8b613204e7425260de0c464c8bd5413449e8278bbb584b0ad931f62e50fbc4023944ad4716433fcc28ebc2974fcce144d94ca6aa8779a3e7a2da41
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+4K6:LJ0TAz6Mte4A+aaZx8EnCGVu49
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4084-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4084-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4084-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4084-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b7b-11.dat upx behavioral2/memory/4084-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4084-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b1885b69f9ba801461a4e6affd263acd444983bbdeb2e872723db0ccdf6e736N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5039e1c8d49504db0d2a2c75e6b093137
SHA16b017539d3be6655906b22a60220ec11510fe685
SHA25655b88dd1d1881cee42c989dd37b683ccbf0aa4185b2da6e57cfaf2953e522660
SHA512dd57708a85c526b1a81f353fa541a6033e37425ceceeb7abd5d0cabfdc4368a0965050b6029b6d07fc5d5334af23e21cff1569a365bc40ee4306be40d1a7022f