Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 20:00
Behavioral task
behavioral1
Sample
c8d6d6e3b6d0bf797e1fab7a3ce12020N.exe
Resource
win7-20240704-en
General
-
Target
c8d6d6e3b6d0bf797e1fab7a3ce12020N.exe
-
Size
236KB
-
MD5
c8d6d6e3b6d0bf797e1fab7a3ce12020
-
SHA1
5fb8c5d48a8a90d80108950c14949c42125d1e31
-
SHA256
270ad83bdb2022e922e3d855a72ed864811b2153c320ed52adacec51a0eeefcd
-
SHA512
f0116dbbf44abdc77903c8e7d5222870ce8e0a7f66168f63c499f036883016d8de3e60cc721682ca3a24e49f081a718cf0177873d197fa90c323efcf8ca91e38
-
SSDEEP
3072:+J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/8/FnncroP9:CwDeM7iNEkgiOb31k1ECaJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1472-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/1472-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d6d6e3b6d0bf797e1fab7a3ce12020N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5f32ef69f4514088851c5f1edb6979c14
SHA1f5d2fec3c1c6da2340040e449da600fed18a44bf
SHA256a8d23d7797218dc68cf9a91e06eed54a15022ee0cd254515ffa19cd0a0399094
SHA5120660a598173711cd7c069414e95aa7cea0a0301aad90278bfc50d747e11a29fc84ab43aae5981c93f312f503aab4b9a8202dad2f5964e685c271dfb96a5b45fa