Analysis
-
max time kernel
90s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 22:38
Behavioral task
behavioral1
Sample
11c2bac562c08c6e99ec88ecf518eb70N.exe
Resource
win7-20240729-en
General
-
Target
11c2bac562c08c6e99ec88ecf518eb70N.exe
-
Size
236KB
-
MD5
11c2bac562c08c6e99ec88ecf518eb70
-
SHA1
54d24519972f0d9dded6d283470bd5f484535bdb
-
SHA256
2fc48d80e4bba1c2b679eee21735eaa3b24d404f32f814017e85e04c0cada2e4
-
SHA512
bea462d361a654482712132da235785b76c63411082787cdad6922784b60631255b73204b88b32e208f3376903d968e29ad4e35535b5cbbe7a6ce6e138170d3d
-
SSDEEP
3072:FJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/J/FnncroP9:PwDeM7iNEkgiOb31k1ECFJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2732-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2732-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x000400000001173a-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11c2bac562c08c6e99ec88ecf518eb70N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD57fa2e748c21dc6bd3b7be56b40c29617
SHA1018da06f6ee9fbbe88f60e46e9bbba0da6713d37
SHA25606614672d02492b68c4c5070e14238284436a10e5fbfdfab62a7a0dbe1a81d3d
SHA512fbbf17f6c50b6099c8143b19a17c1b4d2c04460ce9ffb680ccdf2329fe20040ef21a35cb1a3c4cead20f5c981b273531dc20b6a21127d5e4920ff27ad3b18e30