Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 01:29
Behavioral task
behavioral1
Sample
7a40eb5bb90c5340a3b5b03234e32220N.exe
Resource
win7-20240704-en
General
-
Target
7a40eb5bb90c5340a3b5b03234e32220N.exe
-
Size
83KB
-
MD5
7a40eb5bb90c5340a3b5b03234e32220
-
SHA1
e8e7bf34727040e76682ef1b1921305d8a1ec916
-
SHA256
385757ef387981a2621abb7199a28a1e0fd6d3041bc056fc698b08f61ba99ec2
-
SHA512
d72281c0252820602bf611c2489d87c54efb41bdd6732c9272f86e33b3e796fbef48a846428141b5a3145a645eead984b790faf6894f30abd06ea1c22d87f0f6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AK:LJ0TAz6Mte4A+aaZx8EnCGVuA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3940-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3940-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3940-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000300000001e75e-12.dat upx behavioral2/memory/3940-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3940-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a40eb5bb90c5340a3b5b03234e32220N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5567b1c87b1397a1d144d931498e935ef
SHA170a4132cf1d54717cd77e869b869e38aec540056
SHA2569feb2fec69f8b7515fb495f63014aae872f23c9f0e25ae757a22f529ae061bf1
SHA51245950dd43273628f643c7e3119880626258e889b72c6f319627eea30ccd80d9938c8d106ae8dc41ecd15074de37a13edf92d9ffaf47f29f1a0dd8974c169ec57