Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 04:38
Behavioral task
behavioral1
Sample
c50d4a03e064f64c9c1d37b4b37b97f0N.exe
Resource
win7-20240705-en
General
-
Target
c50d4a03e064f64c9c1d37b4b37b97f0N.exe
-
Size
83KB
-
MD5
c50d4a03e064f64c9c1d37b4b37b97f0
-
SHA1
4d066b100df24b3affb42fab72c49516ffbfc562
-
SHA256
38859e35de8fcbdc2e0522ea7485d18691e2ca7e12c83dcb81a757a89f3b279e
-
SHA512
1542adc724f75af232da23e228cf772e94f0fb084933c21d1a318c290f54d13c11f4da08f051d188107a129e977cc3f1808a15ee42ae8cbed4dd36d95866920c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+ZK:LJ0TAz6Mte4A+aaZx8EnCGVuZ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2988-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2988-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2988-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2988-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c50d4a03e064f64c9c1d37b4b37b97f0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD599e5f47a5cba1c408343df26b613a518
SHA1b5964d44d03013019aa581946f103a6da11fa260
SHA25617b6dc3c4dd23d71f90809c52d7c3ac5d1d471becac8dceb838144a558ce8e0d
SHA51264c915bcb205b727ccf9d3ef1c1636b2754bb1142a3479040b1cd1e99ae558391ba812db6fcaf337890176851fbe3d0d0e40928fdcb3c016110c97aa7ea3e2d9