Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 23:15
Behavioral task
behavioral1
Sample
c44c0a91bdc980085d1dc608c0e271e0N.exe
Resource
win7-20240729-en
General
-
Target
c44c0a91bdc980085d1dc608c0e271e0N.exe
-
Size
83KB
-
MD5
c44c0a91bdc980085d1dc608c0e271e0
-
SHA1
81ea1219508b2b19a5a31808ea4c3c8594406702
-
SHA256
2ad7c57d26b4a946249c251951c92be1457d429f5af1a6828cbcdc8dc74dd653
-
SHA512
bd62e002994d146a8a949083986b421036169aec4c53cc00f6a47848c698cdf89c974ca1b341988950b202e1a4e84cef33686f69b214e06400899e3276dc3ae2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1792-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1792-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1792-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x00090000000120fe-11.dat upx behavioral1/memory/1792-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1792-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c44c0a91bdc980085d1dc608c0e271e0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD51f0d274d4638109e151a7a18142961f4
SHA135a5be094cc3f914362e38b7b8074b3dc4ba5cf0
SHA25620395dd8b947f65081dbf8e765093af0ad759a0aa207a4bf95e20bceab6e6111
SHA512669b737cb8225dfadde5f4f3fcccaf2efec2be5f4f511a97e259f900d4e9b566a21c77c2cb557974d6b7bac51eec80e321503a42d56db99aa481472e8d37d78d