Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 04:02
Behavioral task
behavioral1
Sample
5f1a98be3b3e8db28359841a2af4b8f0N.exe
Resource
win7-20240708-en
General
-
Target
5f1a98be3b3e8db28359841a2af4b8f0N.exe
-
Size
236KB
-
MD5
5f1a98be3b3e8db28359841a2af4b8f0
-
SHA1
f58e54a13b018d6e18bb01b3b9c379635b3f945e
-
SHA256
99dec46d6d65540ea734a114d09f64155479f6d673a0f3c13938a9f6f574885d
-
SHA512
562164b35a054d2b538e6eb98cea7c1758f0dce61b9f929ceb667584cd85c691e903191da6f25fc442b3e0d17a50d39a51236bf494a39d64ad76b0df8d8fca7d
-
SSDEEP
3072:MJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/K/FnncroP9:QwDeM7iNEkgiOb31k1ECMJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2680-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2680-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f1a98be3b3e8db28359841a2af4b8f0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5bf9b4a0d58499d7d7c0589d623116111
SHA1bf231b0c7f105b8524bdeee6a2e85fb2ce08f8e6
SHA2567fde3e734080fa3e7b58265f784dbf9e703f4711994762741fde39f29ec6a2f5
SHA5128305de3286b94c6faee008c279b8ed0f17dcf7520d860882eb30721bde0dd4f6e068e0be647177f5a4ffd838adcf2b3b5b93fcb66959216eb8ead5fe3eb7da54