Analysis
-
max time kernel
111s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 09:12
Behavioral task
behavioral1
Sample
c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66bN.exe
Resource
win7-20240903-en
General
-
Target
c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66bN.exe
-
Size
83KB
-
MD5
29b597f36773db708a1d0dddb22d7710
-
SHA1
f103a3e1e228a996fb676f81cc326da7918c8449
-
SHA256
c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66b
-
SHA512
a02db401902f7ea1ad13aa91778d72b99e48c5e6dcda47041852d266404e8cba8b8b283399684441b02a01569d4836582c62199d3ac42f7002b354447bf89197
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cKq:LJ0TAz6Mte4A+aaZx8EnCGVucl
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2816-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023cd4-12.dat upx behavioral2/memory/2816-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD564c563e7a50a65b0cddd11e185a5370e
SHA1bb8130b55016733fb67cc8448539edcda7c779f9
SHA25642b0c9808937bbfcad1754dadd051240a732f8143e3cab820acfc96f10e84e4d
SHA51277f59239cee7adb948667f1e02cbb4413efdc60f96e6ac8864f02537139ca10e6b8180b40120a73bf1373ba34e98b7f90bef7eacd034fed234a79ad7635f44e8