Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:37
Behavioral task
behavioral1
Sample
7ebc9fdb9f959431c8bfa72fd25d53a0N.exe
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
7ebc9fdb9f959431c8bfa72fd25d53a0N.exe
-
Size
136KB
-
MD5
7ebc9fdb9f959431c8bfa72fd25d53a0
-
SHA1
e85df4a9ad40e270e2c14efecc1b7dc28835783f
-
SHA256
0cd81da46f73247594b8397004e46fcf81ed4492c0e25fd4fd16382fe9ebc2fc
-
SHA512
2adccc5a50f2705cc1c0d52b5e76854e2e869e26cd386929e0bb9f534d4023861fc3f8058a195e0d7fe404f8a50f14a517109c463ae5200a9e86b87dfd920366
-
SSDEEP
3072:KQSo7Z+NC9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6Pwy:KQSogNC9iMGsSaOyiZ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2288-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2288-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ebc9fdb9f959431c8bfa72fd25d53a0N.exe