Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 21:43
Behavioral task
behavioral1
Sample
50d21aa7f5e4cc5b4c57a49f8f31dc192c38c037d8f7ce64c5dd369ae7c5931b.exe
Resource
win7-20240704-en
General
-
Target
50d21aa7f5e4cc5b4c57a49f8f31dc192c38c037d8f7ce64c5dd369ae7c5931b.exe
-
Size
236KB
-
MD5
4a2f41c02a4b2d8c15b0f20f3f1e8984
-
SHA1
3b196ffcd3b4a50e03fd95559574bd9851291e67
-
SHA256
50d21aa7f5e4cc5b4c57a49f8f31dc192c38c037d8f7ce64c5dd369ae7c5931b
-
SHA512
8e392091919c2895f62ddd03053449d469d34bea7158d644dca070ea3f80d0ae4d7ef061532ebf4189eb68a35cc0dbdc145dfc840f2393629ac65233b2d68c90
-
SSDEEP
3072:vJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/k/FnncroP9:RwDeM7iNEkgiOb31k1ECiJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2688-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2688-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50d21aa7f5e4cc5b4c57a49f8f31dc192c38c037d8f7ce64c5dd369ae7c5931b.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD538facf1d2cdd6eaba199d8ec012ced17
SHA148b611e0c65feba0a7fb9381076d5d15c7c77a5d
SHA256264391f5b03a7abc753cb67946e39ebc51f61c8ec45efb6cf911002abad64c2c
SHA5125970d966575d93b97b1666fcc7a2d9c9393fde3c63319450b7a3bd7e1eade695f17df57ce2a173f3f172b6e6ed2401bdb0753de55408d8e0a82f1cad334a9e28