Analysis
-
max time kernel
119s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:03
Behavioral task
behavioral1
Sample
bdbcf3d4a486be390fd5f709fb147590N.exe
Resource
win7-20240705-en
General
-
Target
bdbcf3d4a486be390fd5f709fb147590N.exe
-
Size
83KB
-
MD5
bdbcf3d4a486be390fd5f709fb147590
-
SHA1
df484e03be35cf6021cc51bd1a5ad6621b190fc7
-
SHA256
fa698185fb4f2d232aab8f4de56c2cce2cd0bed954c0dd8b285f873386aabb51
-
SHA512
577a08206e60db6b22c55703cbc01c0ea0bb26e8705dccd04f3509d4cfea3b523e8c5fb218536d3ba30660e1513ac32468927efa098645e5e30a54ae31ef3d69
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2204-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2204-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2204-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2204-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdbcf3d4a486be390fd5f709fb147590N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56d6752225b727f8a7a65a024f7fa6898
SHA1d9823827f138d0c6089c793fa0bd2741c5dfcaee
SHA256d173ff865abf4c1450c92806b1a31fe3240b0f5b1bd5915b8d62ea0e44c2a81c
SHA51239edb75ff6effe29c90a995786bf23967c990689b54934258fa830cdd1f22a1d450e80d55e1264b1254e10198692cfcfecfc4e2f468ae2481b8cb8ccdd3f183c