Analysis
-
max time kernel
37s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 04:01
Behavioral task
behavioral1
Sample
c64fc01ccdfe9817814dfca5ae495ba0N.exe
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
c64fc01ccdfe9817814dfca5ae495ba0N.exe
-
Size
33KB
-
MD5
c64fc01ccdfe9817814dfca5ae495ba0
-
SHA1
befc7f4a37b2d09a93e927c3ea7a121c8dada9c5
-
SHA256
d7937a13fc0ce097b42c42b5b36150eb318cd9f29f9bacbe61770751c80a99cc
-
SHA512
1407d6c08854442e060d1f2c74c5edbe835a46178a7c311a7deb5a13a63c0959b152df4a802050de00c89bd1425f79e0e1078c1d3fe62e8928220128bccf63b6
-
SSDEEP
384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9ZmuOQ5:kBT37CPKKdJJ1EXBwzEXBwdcMcI9nJ5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2680-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2680-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c64fc01ccdfe9817814dfca5ae495ba0N.exe