Analysis
-
max time kernel
91s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 09:03
Behavioral task
behavioral1
Sample
f0a4ddb33a2126aceda3e59adb6f47c0N.exe
Resource
win7-20240729-en
General
-
Target
f0a4ddb33a2126aceda3e59adb6f47c0N.exe
-
Size
236KB
-
MD5
f0a4ddb33a2126aceda3e59adb6f47c0
-
SHA1
6c199c01a69a6f188491227c5889783a065e76ee
-
SHA256
35eab58db6e4b527d044f75dd5fc918063bee8cfe33bcc70c8a70fdb5ea79c37
-
SHA512
57bc8b72cfc25ad3f67d96e31370e71d6d6e7a9becc1d498f3eadefaeae3c1772d15cce131896ad603b8c1b1150179475d0e44993146607ed2b863815d92ea61
-
SSDEEP
3072:7J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/b/FnncroP9:9wDeM7iNEkgiOb31k1EC7J/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2464-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2464-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x00090000000120fd-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0a4ddb33a2126aceda3e59adb6f47c0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD532b2b53c31c0d531efd7ecb4198a923f
SHA1fd361a652ee2cae53b90d3869f217659ed36bf17
SHA256d34842d5c056e9c1fde2661d8bb5497ed0e2766fd4533598245f77811b23a66d
SHA512ed392883bf1419cf9c9a5889086d8d1b3c55291caa6c3dde905d2679dd7e89c1cd972bdcb839c68bc238c8c6613a321e9a5a07d219fc3d732dc81a2dcc95137b