Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:05
Behavioral task
behavioral1
Sample
8e20af2b077ec3d669249e42bb5644b0N.exe
Resource
win7-20240708-en
General
-
Target
8e20af2b077ec3d669249e42bb5644b0N.exe
-
Size
83KB
-
MD5
8e20af2b077ec3d669249e42bb5644b0
-
SHA1
c65844415a8a8cdc0b014f5bca77f111dc06b183
-
SHA256
35a44cd77da972268e1e4bacea35908a8df24ba6f38248b3847e855dc39f8576
-
SHA512
c64c7c5436ba43e1a7315852c9a1cd6097bab301e385ec20ffa6eaec1dbf266af82add56abb958b791bec1ab459505f1f5070e56008046e4aa93bd4131ec6d9e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+PK:LJ0TAz6Mte4A+aaZx8EnCGVuP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1712-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1712-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1712-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1712-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1712-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e20af2b077ec3d669249e42bb5644b0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD508dec8bd2774544c8b6fac35f8f962de
SHA12af3cae31a08b495554216531bf6cd0e4aae54d4
SHA2566c4cc8ef062b316e3b978a60f6f5526802001115fe158bbba0eb7ab0507719fd
SHA512ca2efa12b47fada064856da2abd2aae9251b773263c5b61d86f7f9a8e6c5c9544a385314cf054dd1c1e25bc635c6fd451ff0e34b3c92fa7769e0b6a073b36887