Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 19:24
Behavioral task
behavioral1
Sample
a7a5d2c39caf4f1bc079c1fe2f651300N.exe
Resource
win7-20240705-en
General
-
Target
a7a5d2c39caf4f1bc079c1fe2f651300N.exe
-
Size
83KB
-
MD5
a7a5d2c39caf4f1bc079c1fe2f651300
-
SHA1
8a1980ab9c37a8875c1dd26e9eeb0b51daf512de
-
SHA256
c6ac3fac37445a374836abfced18748893b9d7d6832b58c306e88bb24827e2a0
-
SHA512
e34522ea10ff399bb560556dafe65e9cf97993d8bfdf2bc5bcc6da6f32a5590f6cf908103e3bbd951a92bbc87238d05c2b13061849a8e8fd07dc4994fff91ad6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2516-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2516-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2516-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0009000000017559-10.dat upx behavioral1/memory/2516-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2516-21-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7a5d2c39caf4f1bc079c1fe2f651300N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5b95446c952765e5b7b7a3b82e343be0d
SHA1c5f7d950da5a63869482be05dd411a757defc29b
SHA256c47bc8697c22e9db37b30a508a538bb88d3955e754ef0a252bc480b70c68f408
SHA51298fa39c2436d91da09aed428796416c3d76a3c09d16ac4a49a9941777ff1711e5e3eef171da8de3ed706b5be42d2356fe5cb9c59bc7f90eae5aac87c892717f3