Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 11:16
Behavioral task
behavioral1
Sample
2c4722e9a7c8618748f9b6b3389b8ac0N.exe
Resource
win7-20240708-en
General
-
Target
2c4722e9a7c8618748f9b6b3389b8ac0N.exe
-
Size
83KB
-
MD5
2c4722e9a7c8618748f9b6b3389b8ac0
-
SHA1
d5365b62bc23fb89d10557cc479567ace6f47b7b
-
SHA256
de8084e09f00951cfa5116cc90ec3ff570f9a490f152901912ed04a5418e1892
-
SHA512
f776100f78ec770e788e6a42996fa727111cabc388bf256ef9647e65fc2d634a4c4ac13a29cba74f33ce6cf425394def80996527b210c1d6dd35e95c508098d0
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK:LJ0TAz6Mte4A+aaZx8EnCGVuU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1484-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1484-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1484-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1484-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1484-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c4722e9a7c8618748f9b6b3389b8ac0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD557c4e248b83c6fdf81741e60534075a1
SHA1829b523510bb276f8fb42b70faa339375c628a71
SHA256ebe841949424765efccdd98231de10aacbea74939fa109c458532e3c17d07c68
SHA51288e306e890631485e4d304c169a7413b263c32765aae538ba258f55b4bcb71489eec80085a78d51f7cebd9a318b353099e611bc02f82b9b28d40f500d807ebc3