Analysis
-
max time kernel
112s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 00:59
Behavioral task
behavioral1
Sample
030c740c5605ee54986b4c3c32cb0870N.exe
Resource
win7-20240704-en
General
-
Target
030c740c5605ee54986b4c3c32cb0870N.exe
-
Size
83KB
-
MD5
030c740c5605ee54986b4c3c32cb0870
-
SHA1
03c63e1bbb8b10e58b0aecf0d25b88f2fc292d48
-
SHA256
dbe838ebab7d3a0323282cc8387fbf05a7ea5df04ec07f2b18e3a5157361af93
-
SHA512
09a9d9f4219589efc3a4eb52a635af49f347dc5b8eaac70f5499230b0f2f0a0e54d5fab079367d479f2e15ffb2ce33d9d5f73f3491c46c4f9a29323762b053cb
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+MK:LJ0TAz6Mte4A+aaZx8EnCGVuM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1824-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1824-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1824-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1824-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1824-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 030c740c5605ee54986b4c3c32cb0870N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5051d2f8cab235aaac4c894e028a8bdaa
SHA1ff1ada4c7981a46160567f09ec81061259a58dc4
SHA25690f3cf58da2f79034d0753ca53bf685d60a730be9110a73944de8fc7a4e88503
SHA512393785c602377afdbb4c7f633e100cf4522419bb1432ee91977429ec4a6f09311faa4b783c55624113c6101be75a7f66d0b09a9546c826a9b75fed304dbbd3ca