Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
c857bef1c17171a31175e6f5be0eba4491a0a55b0db91d041f9b4223dbb580cd.exe
Resource
win7-20240705-en
General
-
Target
c857bef1c17171a31175e6f5be0eba4491a0a55b0db91d041f9b4223dbb580cd.exe
-
Size
3.1MB
-
MD5
8e94d94ffb5f0a1daa35e46d567f7aee
-
SHA1
d885021314fd8a7010145bdec8a92935fc981949
-
SHA256
c857bef1c17171a31175e6f5be0eba4491a0a55b0db91d041f9b4223dbb580cd
-
SHA512
2ece2dcffdebf208458a86ff44d5e6923802c301b6d8523cf2a816012571dfc34408058ec6425b965a6ea998b0de1d7dd427fdceb787cdb3f6f031204f0c4645
-
SSDEEP
98304:LAcRTd/kggQSwydThBmnXodHG+z92I0xkZV8zDzSC:PRTFkg3SwyhsXoRG+zAkZCzDz/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2848 setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c857bef1c17171a31175e6f5be0eba4491a0a55b0db91d041f9b4223dbb580cd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c857bef1c17171a31175e6f5be0eba4491a0a55b0db91d041f9b4223dbb580cd.exe"C:\Users\Admin\AppData\Local\Temp\c857bef1c17171a31175e6f5be0eba4491a0a55b0db91d041f9b4223dbb580cd.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\7zSC5A6F507\setup.exeC:\Users\Admin\AppData\Local\Temp\7zSC5A6F507\setup.exe2⤵
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD5b4da1657d31832c9965d54c5037a3402
SHA1c312863d621b0b5ec9ec930b1db73de3c95f7141
SHA256563fcd4ca2678ddb6c1366c92aa4daa410d7eba73d68d9336fb967f732770c8d
SHA512643d2ec57767443e0efcc580a0e5abe062375f34b936daa22aa24e20d837b84854de18f636dc0ca5d100b4309a456746d733a65f8d1ccb173fe590ab5bf99007