Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 03:14
Behavioral task
behavioral1
Sample
5ff081934b40084a39b19bbb45550790N.exe
Resource
win7-20240704-en
General
-
Target
5ff081934b40084a39b19bbb45550790N.exe
-
Size
236KB
-
MD5
5ff081934b40084a39b19bbb45550790
-
SHA1
60da6d7783be1b423c7c3ab960470a7c1b769222
-
SHA256
bf61958dbcbfd5efb501bb622d238ea02b96b86cfef052d8c9749d0fb0e1e10e
-
SHA512
eba310ed98792cb561823c0bd03664d024609428a464025a32ae5efa1a5302531b2b4784619475f9247f67d43cd80f66be028090406cd8f222de8399c6faf8a0
-
SSDEEP
3072:UJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/N/FnncroP9:YwDeM7iNEkgiOb31k1ECZJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3056-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3056-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0010000000011b9d-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ff081934b40084a39b19bbb45550790N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5eefa634840c659cc119e3a166e7d970b
SHA1db33f3ed6cfc4a2e7b95611a9f9934acb1e8b089
SHA2564dd4ce4774e9703f8f4c779042817f1b21c02211dfa03ca8fe945cd75a2b1832
SHA5122c6078558d5c8cabe8890888a868e332780e823fec287f231f49736d304fd853d5a6946291987d27bb6fcefa2735ad5e8d9831c98b6b6935357ba0bd4ac658cf