Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:51
Behavioral task
behavioral1
Sample
d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e.exe
Resource
win7-20240903-en
General
-
Target
d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e.exe
-
Size
83KB
-
MD5
18f2a5eb4af8c78d26449fc599a2cb1a
-
SHA1
066901f212e31b86e861dd8e9145789328401ee7
-
SHA256
d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e
-
SHA512
8f1d5aacedac86d62cb281253b8a47221e34ee9282f636c2ddedd4850503567f6131303396ddc030dd0d0a261b6e5711b62a3b2f56530c9a467b3d8094ad596a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TKK:LJ0TAz6Mte4A+aaZx8EnCGVuTV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1500-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000b000000023b7d-12.dat upx behavioral2/memory/1500-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-22-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-29-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1e9185d3be6f62792ec9ba78b667f96ce50ef835474cd561ae2d633ae12782e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5d2628e950ebce9ea8af7fca6d1885275
SHA1476a45b4800db9f12ec981140b809b665b865341
SHA25633765dd93f95eaa943662a8ff3ae67d9b4ef3a567b2b51a7251e12e7b9d86c92
SHA5129781cbd2d2a3fccd51b04682e6a65d97674f1b3d427c28358cda004c9535d5b2063c61afc7b8622ee0423b4f9457923a08a6dd87bdffe87a95f7abbb2c9e421a