Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 01:29
Behavioral task
behavioral1
Sample
2e17ed9ad6758061f648ad25a6b66180N.exe
Resource
win7-20240704-en
General
-
Target
2e17ed9ad6758061f648ad25a6b66180N.exe
-
Size
83KB
-
MD5
2e17ed9ad6758061f648ad25a6b66180
-
SHA1
a490703a9550d98cc6e6d1fa3d11a1e8d0908b9b
-
SHA256
dcd33e3f0221103f9a60ecd32b754170bda027a8fafaf2403a3fc1441679a0aa
-
SHA512
f07a902d2c7b5242981045aa4076f7e769a28efaa44c506639e4b4d8a3c835e7d84d23c2a38f8850e475bd524af4b55fd4ff9beb1ba59dd4e84980521497f642
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2668-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2668-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0009000000012115-11.dat upx behavioral1/memory/2668-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2668-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e17ed9ad6758061f648ad25a6b66180N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a1fe46c24206336e3b648e26c219dec6
SHA16d569a4c70c2e4610a22cfd781f5242681ed3664
SHA256016b209ae7b827b421a97ce1ccd2d3aa73fcc59bf0a407c198a346b5a504811f
SHA512148689e2bcc8f4eba20563783a64e86edc564551fe114558058fb921a68fd135a2ad0cec1f7bec1eb8d4dc115b516628aa48d8edf116184edc2057022ed823ce