Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
601f77d504c087d98216a9e2358dff20N.exe
Resource
win7-20240705-en
General
-
Target
601f77d504c087d98216a9e2358dff20N.exe
-
Size
588KB
-
MD5
601f77d504c087d98216a9e2358dff20
-
SHA1
46755364f1f37e8fa6ce9ab07e3f4263bd54bdf6
-
SHA256
c4e0aa49f5b0e1e3a163f852bc37b01135d07cb4cb6e2e6626c404be65e7f5fb
-
SHA512
4bfc9a4f7ac1f8236f021c54dea52058569a3bf31ae701873883c3b4e84b65075b241b718616ee84eeef74b2ea43c748f84d5cc97a0121a477471ad2dc56596b
-
SSDEEP
12288:hMYts2jbSPPTMBb/7h636HcB3Xf3SUiw5rW867JtYZj9yh+:SYvpHcBHqe5rWP7JtYZj9yh+
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
resource yara_rule behavioral1/memory/2296-1-0x0000000001E40000-0x0000000002EFA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 601f77d504c087d98216a9e2358dff20N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2296 601f77d504c087d98216a9e2358dff20N.exe