Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 09:02
Behavioral task
behavioral1
Sample
725a80d725f5143e1612186d51c295a0N.exe
Resource
win7-20240705-en
2 signatures
120 seconds
General
-
Target
725a80d725f5143e1612186d51c295a0N.exe
-
Size
154KB
-
MD5
725a80d725f5143e1612186d51c295a0
-
SHA1
071e0ffec6652913b6403efd1985df1a7c890344
-
SHA256
432b916960b6cccfc7dd180757e3b7e3f1f65e6b9c4eb335fb2d202b5edcc6d2
-
SHA512
11aafdee02778fb5c7c7e9373f21a0b5fa1b701707ed7a3b77805ccf629fcea950761621a5ca21f761cc0c49aab7dc41d7fa1e1ab1d280cfecca483caaa85d7e
-
SSDEEP
3072:fny1tED7dsXDZklYGCYusulUljKwOgobY:KbEDlVOo
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2232-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 725a80d725f5143e1612186d51c295a0N.exe