Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 01:31
Behavioral task
behavioral1
Sample
7a8f16b8d7f3ecddb9869821ffc3d250N.exe
Resource
win7-20240704-en
General
-
Target
7a8f16b8d7f3ecddb9869821ffc3d250N.exe
-
Size
236KB
-
MD5
7a8f16b8d7f3ecddb9869821ffc3d250
-
SHA1
e742477079d567a75693cd267ca87776a5f9dc66
-
SHA256
cd3be1ed372ad558f2ae95524c3999077558f089dac7be4448cbffbcf25ca9d1
-
SHA512
a6282a2c2650a6586827e60ecffe0ededd33efc95cb3c1f51884f87e89d47b9378836862578d072e1bd07e50a51779e8bdacd493319a4646b30a7910006d548e
-
SSDEEP
3072:LJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/K/FnncroP9:NwDeM7iNEkgiOb31k1ECsJ/F
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/3700-1-0x0000000000400000-0x000000000043B000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-D4ODpQ82uy57qSwj.exe upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7a8f16b8d7f3ecddb9869821ffc3d250N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a8f16b8d7f3ecddb9869821ffc3d250N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5451f8ddca35c68c1ea86c7ca0c607a2d
SHA10d9ef0fdc694678806cca614863ba84ebb2c25c6
SHA2560f32d1a2500034118af3a67194ec1541b3af730e04e7e252273ea3bf343686bd
SHA5124585fd5fa50a97c509a7c81b3f56e770fa376e58c194e5f07d7c84f4b8948bbaca96ff21fc4f72695dd62ade6350094d7defc2f61da1f2d5d1fe19610dc57e0c