Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
no$crypter.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
no$crypter.exe
Resource
win10v2004-20240802-en
General
-
Target
no$crypter.exe
-
Size
995KB
-
MD5
5d051c389e7082d38e95081f8852e4bd
-
SHA1
7cb6c1bf819eb15ab6237281c3777452bfabdb63
-
SHA256
80aefd84c1adac1ff073f07ce361165a2085bdd7760cad4da19fa14c4e729294
-
SHA512
7f4eea7d2023d933b0085472f2e012bcf9c115f189b4a604b20523834ce10fcb096aff1bd199b9de6b69f7a9213ac6a8b4d9afb8997bcaf8e02350804cb498b2
-
SSDEEP
12288:fc05vPSEtIdpaf4u9jEwjibu8kCKiuUC:fc05HSEtIdgfZjL0u8kCKiuUC
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts no$crypter.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language no$crypter.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c4f92d48134e9f4e2db1ac6df8cdc459
SHA1cad49b3bbeac81f3f414927c1f956074091eeb4b
SHA256f25890b940612d8301762e1c25f67878a141947eb500ce7a17fbc24fc647e13d
SHA512248da680bd39b73f10b97fcb489432c2c4783f616c5abe29c7da357e01df8d9b05085a13febc6eeff5e8adf56c7de48ae0320740d40cd95227427ad7638d17f7
-
Filesize
2KB
MD5349d994fbf989fc21c03e1d474fb158b
SHA179817272e5178c3252bc1b62c50637e454b12efa
SHA256868a9e7430f83a900e6394758450eb874d823317e7e86ebbb7e8c652d486f3cd
SHA512d65cb00b0acdb83cdbff1db58cd0b88eb38130ff0c2c644a3df324a604e96625022ea38535350d55f891325b29eacbd15701f5a2f73e07397768c122f6ad2e78