Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 12:34
Behavioral task
behavioral1
Sample
978e807d06601087d7f4742534939430N.exe
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
978e807d06601087d7f4742534939430N.exe
-
Size
103KB
-
MD5
978e807d06601087d7f4742534939430
-
SHA1
c532d9c8bb8b8c97ac8bd594c25a64c1d1fef64f
-
SHA256
a4ca60094954e20867d2827727d891ead59dd0608f23d970e65466f35edada3b
-
SHA512
54896af9eb61e38baf70201ed75205c902bc5d05a26f6feb27ae55efc249eb24d97b2baebf400d9193812825d78398f024323c9bd5e584def03f9ed34a6a9e4d
-
SSDEEP
1536:CTW7JJ7TMTmXadjUSbcDemTPAZk+cLtdNlb9PfESDOayxaJr:hQ6W2QZwKS71
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2712-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2712-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 978e807d06601087d7f4742534939430N.exe