Analysis
-
max time kernel
110s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 17:37
Behavioral task
behavioral1
Sample
61184e1289e7dabc1f7473a0caa395d0N.exe
Resource
win7-20240704-en
General
-
Target
61184e1289e7dabc1f7473a0caa395d0N.exe
-
Size
83KB
-
MD5
61184e1289e7dabc1f7473a0caa395d0
-
SHA1
2b2e36604a2de625ccc19a0ec5b23ac1306a0ad1
-
SHA256
f9f1ddb3152075edd0c3d8f4f7840c34c691407cb31c370b82c52d2e7c604deb
-
SHA512
ad5c5fa8cf8523802bdf1aed1ecb95c5485cd9a21cc1a29f50ce4779662fcdcf121b8e479860b1a33bde2ef90a542649feb609e439253372e4afbb01d0f72fb2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2276-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2276-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2276-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2276-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2276-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61184e1289e7dabc1f7473a0caa395d0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5630e9e93e7ea117a3926161f85aa5950
SHA1f20bfc0885e43ed70f92bc660bf1be454ac7e88b
SHA25672ba907d4268a9e7d80cdc89a65280fa4b165de29a9c509ff872b6554b9c48fa
SHA512ef13e8474f67b41b4864fcec17177669dc3423c8cc12a88b469c05ff5d46af35bd30254c974a280f338669e620687581972ea9b4f3a1124be0260759daa10d10