Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 23:30
Behavioral task
behavioral1
Sample
23e334adc396c466dd36cef522b5ad00N.exe
Resource
win7-20240704-en
General
-
Target
23e334adc396c466dd36cef522b5ad00N.exe
-
Size
83KB
-
MD5
23e334adc396c466dd36cef522b5ad00
-
SHA1
7a0e5399cd413f0ae31c59f0f89a11ece73517f8
-
SHA256
22cea687b78a02b645e7bf9a1284c87835ee54f2454dfdfe73c0a0faf5b6bf64
-
SHA512
6e4cf9767fdcbae290b1ca6f4b048ae6bef5654cdd49bea31b6bc026f3b89528f6e740d5df0981a294acc43341e7bfa5cf172858f8085437b1f2dac92d3ff978
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+1K:LJ0TAz6Mte4A+aaZx8EnCGVu1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2388-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2388-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2388-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000d000000014132-11.dat upx behavioral1/memory/2388-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2388-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23e334adc396c466dd36cef522b5ad00N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD528f7fb499523d577b3da6a99b0ad43c6
SHA1173644a6ec6425a0ae352d33c7a2f02ae28565b1
SHA256d9b366cedfb9b19b61f36730d2e816b372d6f0334b6ebd9d4e8f4785e45220d3
SHA5124e8abe520e18aa26c92f8e13205fe14e181da9288061d74bd443a4f02723dffd1f1ffdc8e976dde80451db52fcd5a593ba1fc0203e908b612b1089641d37a0c5