Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 06:45
Behavioral task
behavioral1
Sample
e3c2be6893a3b392f2a0ff852ddb5cb0N.exe
Resource
win7-20240705-en
2 signatures
120 seconds
General
-
Target
e3c2be6893a3b392f2a0ff852ddb5cb0N.exe
-
Size
188KB
-
MD5
e3c2be6893a3b392f2a0ff852ddb5cb0
-
SHA1
f71072fb8016a72ab310c54481a8d78a23e669c3
-
SHA256
d64801321adfea6561cd528d6dc2d4020e5b5e6e8aa7f1f573a76b59a5500182
-
SHA512
00904b66473990d9c2c19e5fdea16aa8e03ef5ab9243c67ef0e7f98b1f2565858cd584f909d34ced3e802323f389b4a8eeb2be181e16c149f27ae68afd018e0a
-
SSDEEP
3072:fnyiQSox5Na+WHIjN3tj6qnv0b2UrXkbvLS:KiQSox5cIjNDv0bNXkbvLS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2968-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2968-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3c2be6893a3b392f2a0ff852ddb5cb0N.exe