Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 17:12
Behavioral task
behavioral1
Sample
cc33a035b730d05fe75f787d2b949a50N.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
120 seconds
General
-
Target
cc33a035b730d05fe75f787d2b949a50N.exe
-
Size
180KB
-
MD5
cc33a035b730d05fe75f787d2b949a50
-
SHA1
6564b05730e80a7a5b00d29bd660225a3c654dc0
-
SHA256
53ad1a5779dc920b28054698340a2699981bf5e2748924f4407163897393bdfd
-
SHA512
904b92750d5acdd4d3ee56910ada721961a65bc006de3e7928e0a05e808d1b56a678a583357f6db4de3498f915db3b699d95ba1bcb6b2e6f018879cc85cbe8e3
-
SSDEEP
3072:fny1oRobWlW0GWHIjN3tj6qnv0b2UrXkbvL+:KWRoKIjNDv0bNXkbvL+
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2692-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2692-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc33a035b730d05fe75f787d2b949a50N.exe