Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 12:42
Behavioral task
behavioral1
Sample
0c9df3529a6e7445f90a6346a5660620N.exe
Resource
win7-20240705-en
General
-
Target
0c9df3529a6e7445f90a6346a5660620N.exe
-
Size
83KB
-
MD5
0c9df3529a6e7445f90a6346a5660620
-
SHA1
bfc77b13e2d3fb4eaa5a421c3866532c6cadedf3
-
SHA256
d37e5e79da75cb415ef5aa0081642d7981143cad111170e01c09dc7592950b82
-
SHA512
d82c6c28448344c6e12aacccc79440b178aee26aa449f01d471e3498f07e7342b02bc13cc0f140dece3ced82ad047e46fc40a27e8687ee81d4cfc814ef638928
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+CK:LJ0TAz6Mte4A+aaZx8EnCGVuC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2452-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2452-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2452-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2452-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2452-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c9df3529a6e7445f90a6346a5660620N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57dc4d45f73f1dac9049a5d96af4f8d8c
SHA13f31b16bc3b45d7964f2193c4fc9c533713559f5
SHA256b5a563ab2c4773aa636f05ef46dc0c994831997fc15f13a24a7cab3c3a3718c9
SHA51274a3d43c095fa921bac2733c643c4ae0c853e31340d6acd06a287a18299450f8545720715e436e9270afccbadf60668e65d338b36041c4302a8269f19ac75325