Analysis
-
max time kernel
92s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 17:39
Behavioral task
behavioral1
Sample
bf9dff0dff709abf9aa24f716a785090N.exe
Resource
win7-20240705-en
General
-
Target
bf9dff0dff709abf9aa24f716a785090N.exe
-
Size
236KB
-
MD5
bf9dff0dff709abf9aa24f716a785090
-
SHA1
22ee30c570dfdc2e2a1765366b9ccea72b166b17
-
SHA256
7fc315159422a6d431c2fa79c6fec4b9d420c0fe044b3702d4739fe3e6388131
-
SHA512
74297539a3bc1725b063535782e118d93656a54770003f4f1c3d3aca4bb571e8f900339a5e54cd5cc9d4beef57e5df3e0cb3f399edac6e6f0eccd98023234967
-
SSDEEP
3072:dJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/6/FnncroP9:HwDeM7iNEkgiOb31k1ECMJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2724-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2724-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0004000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf9dff0dff709abf9aa24f716a785090N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD57bbfb52992102aafd046d3a0ff5ab2ec
SHA1c468615e8a5dc4aba7e9c1b9ff00c3577092d065
SHA256143af21c7ec40c4c33ed7ebec209a4f27a42fbb4c889076b427075cda0fbfac1
SHA5122e69d47d4c74faea231f54fae83a901cc2390215f067b710412493b3f863cc20a21a8e43a7922d80442064646e4fce00d2c6cba6c9ef7f2d836d9a432f9aebb1