Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 06:22
Behavioral task
behavioral1
Sample
7a14cf198d8efb91392083ca4206cf00N.exe
Resource
win7-20240729-en
General
-
Target
7a14cf198d8efb91392083ca4206cf00N.exe
-
Size
83KB
-
MD5
7a14cf198d8efb91392083ca4206cf00
-
SHA1
ff275ea5b264b45bfe7e6799c05e5e765fc5ccef
-
SHA256
4f6e3bd2346925c686e70a0fc6ea851d62c1f0ee77b2edc5ed4003e7fb70d3ba
-
SHA512
3b5139b36472341d7fb34c295280be1291461e7a1779e5fe9c1dbff7a553bcbc1b6ca31d7bd51b202bad23b0c2b0dce406020c1b4281d880b1fa26e683b309a7
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2660-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000c0000000122cf-11.dat upx behavioral1/memory/2660-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a14cf198d8efb91392083ca4206cf00N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5639b1243a1e3f5264c4ce06e8197ab1b
SHA114b0dab72e26383af56502f8d346d6fb58367e1f
SHA25654a2c3bd5ef682daafce02fa61beec9aa62615e482d6acc9db07586549cbbf8f
SHA5121067e10bc85440c48351734df3eea9b5f1efc08aecda513f28257c5e7c23560e350815af98295e8c700d0ca8cb400d247dee523eb33e19c8c2f1d1d483aae7d5