Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 02:43
Behavioral task
behavioral1
Sample
24887c5e7d6a8675d34b418a0dc43a10N.exe
Resource
win7-20240708-en
2 signatures
120 seconds
General
-
Target
24887c5e7d6a8675d34b418a0dc43a10N.exe
-
Size
122KB
-
MD5
24887c5e7d6a8675d34b418a0dc43a10
-
SHA1
68cb57fe7a54d603df2dc0da9ce52df2e1dee073
-
SHA256
332bacd80788e97f7e6e0d9ae93cf45f6862ec61b417ef3c16cead80840b3687
-
SHA512
adb03fbcc032cffdfb7be3c1f2067355419f10c81ae50b78c9b3bdd4fc11bd310401e2b2f75f8c03b0e63378c62893de1a66d63fafab9e0b8d17afbf5b0cd261
-
SSDEEP
1536:CTW7JJ7TTQoQ44gsY3hx+fsio5UxKzWZ64+A8K:hoRKsVEio5Ua4N1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3024-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/3024-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24887c5e7d6a8675d34b418a0dc43a10N.exe