Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 20:24
Behavioral task
behavioral1
Sample
04a8e869f298f6cf8e3bc01e77fce290N.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
04a8e869f298f6cf8e3bc01e77fce290N.exe
-
Size
766KB
-
MD5
04a8e869f298f6cf8e3bc01e77fce290
-
SHA1
310196473dfc77cb0858dab99781801d67467f2d
-
SHA256
ec0aa46e21f3638e43226789e2c09029df2c9da2fcb3b991cefc4ca907200a7d
-
SHA512
12c0e8db0fc736a5f7cef3c0731817476f31e5bb4df348d35792b30e76cf51b0d91112a5fb7347f5961e43c20dab913c936fb55e63895e51f18c99f2db95d84e
-
SSDEEP
12288:VQtUd26Gw+0eDlSw2TNivc8cdPFYFMH1oPJdbYN9JWgYD:VIUdXGw+0exSw2TNh8cdPue1mJdbYu
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1948-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1948-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04a8e869f298f6cf8e3bc01e77fce290N.exe