Analysis
-
max time kernel
10s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 23:21
Behavioral task
behavioral1
Sample
76886ace616162b184921867492fd367fbb1d6294ec5752b8631144540fa93b3.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
76886ace616162b184921867492fd367fbb1d6294ec5752b8631144540fa93b3.exe
-
Size
94KB
-
MD5
0f23a28d87f9b233c13f9806551619b4
-
SHA1
72aea742f0e6848c1f83fa12b00d79d7af082066
-
SHA256
76886ace616162b184921867492fd367fbb1d6294ec5752b8631144540fa93b3
-
SHA512
796c18e7c608fd607d5f581586e9114ce387da591253c23ff201658ac9f9f3bef2d68f29049f6670ba86ef1a7fa17ab4167851a61f86b0f7f43cd741b8fdce2c
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZf2XcqvcYc7syqU:KQSo7Zf2XOb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2524-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2524-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76886ace616162b184921867492fd367fbb1d6294ec5752b8631144540fa93b3.exe