Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 22:07
Behavioral task
behavioral1
Sample
7c4a376cbb92490f28c6ae6465805650N.exe
Resource
win7-20240903-en
General
-
Target
7c4a376cbb92490f28c6ae6465805650N.exe
-
Size
236KB
-
MD5
7c4a376cbb92490f28c6ae6465805650
-
SHA1
c328420762555fa96502d3443bdbfdae54a90a90
-
SHA256
91b02384954d6dc6bddde65b5f3db380460940e37de58140a31bc82adb41a0bb
-
SHA512
5a18a9e8f5025ecd7bbc4ac5ca7f889a89e32b57adfe5fadc2b7a335df3d65d86f3bf60f684ac3df0f3cbff8df70d86200addff8f5f80f3d31ebdce07a9a7ed5
-
SSDEEP
3072:4J0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/t/FnncroP9:8wDeM7iNEkgiOb31k1ECJJ/F
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2008-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2008-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000800000002348d-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c4a376cbb92490f28c6ae6465805650N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5a65ec836b9d1f85cb07e1082d2a9c8a4
SHA15765946212d178ae049195711c33950ef652386c
SHA256b44cfc3550fa01ec435c56f4ef2aefb933000d624c9127b83966843ca93f802d
SHA512aec0b427de9cc0e3d95bb379ce37197f49cdf6401c12ed4af57c693a4d328d7db7b69c0a63ffa16599f428296a3694d675d225e7b41b9c13a6cfa989d0828f33