Analysis
-
max time kernel
32s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 00:11
Behavioral task
behavioral1
Sample
37418feb1df1de03f610b7903bcf2400N.exe
Resource
win7-20240708-en
General
-
Target
37418feb1df1de03f610b7903bcf2400N.exe
-
Size
101KB
-
MD5
37418feb1df1de03f610b7903bcf2400
-
SHA1
1114ce07695ebc66fee1e7f56c5f082ce3130e32
-
SHA256
11515ab87c7576ec7fcdd8d0f9d2c34e70223a7f401f5f6761273988a676abf8
-
SHA512
81357c87facc21e018c1315dc7b737fec6e0bc07e3dae2aaa562162d4ce02ca9044bbfa969ca5e9727c9af0b77862ad6835e070687b21bf1c580252e124a3478
-
SSDEEP
768:jGvbqsQdX5BhGEnOsIzfJ4i4g5p0syi+hvN18K3H8T6++3KI4Fyu8hcLCik5dAyt:CzqsQ5PIt4+/yfeB6r6YcOik5h36lB4N
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/files/0x0007000000015d52-5.dat upx behavioral1/memory/2220-101-0x0000000000400000-0x000000000041B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37418feb1df1de03f610b7903bcf2400N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5b82989283e67272296556a207aea5858
SHA1fc3b1d979cb256d8234b35a1f5ce221ec3a1aeca
SHA256e257aa4e264f9e04cec397fc3ba7304d8d51b2afb109a097dabd8dcedf2aea2c
SHA51238e0480990ddc7136f256d40381293e159e37dcd7902420c266129cda8188b8ac1bf8ee442b12250b56ea642b3774d193973370ae76771c4a127cc4a0a2a3ab8