Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:06
Behavioral task
behavioral1
Sample
8ae70cad13542991bec3c8924c9ea4c424784ed0564f95a143e0bc76e5507c5dN.exe
Resource
win7-20240903-en
General
-
Target
8ae70cad13542991bec3c8924c9ea4c424784ed0564f95a143e0bc76e5507c5dN.exe
-
Size
83KB
-
MD5
6e09d3b4fb88f428d90d09850d96cbd0
-
SHA1
8358715ae13994be5177c251647fa74766a2f8c8
-
SHA256
8ae70cad13542991bec3c8924c9ea4c424784ed0564f95a143e0bc76e5507c5d
-
SHA512
14a8b490d9620305943ce5f24de13f82443824ab92e0df85df53bca45443d615827a947674c5a0454d122ae7c150ff7c95d770276943ef156c0681cd345e408f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UKq:LJ0TAz6Mte4A+aaZx8EnCGVuUF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3964-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023c6e-12.dat upx behavioral2/memory/3964-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ae70cad13542991bec3c8924c9ea4c424784ed0564f95a143e0bc76e5507c5dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58f27da490cd7f3dc3d6d3ca0e6a4dff8
SHA18b16669f03de02d3b0342b8364de0284fef1b3c2
SHA256a3d9d71f9c381d7230a2f0c28defe77bace4f4351f6de56844110354454e8fe1
SHA5122f7544579d2e304ccac436cd625d06c39e1e36d6a2036294e1196e1d83bb7d7f64fc2766c94fe4c27bbef40b24cc6a67d443a149a8c0b2088c534dd2cfa3cc70