Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 20:26
Behavioral task
behavioral1
Sample
e190f136725009ba52ee86f9f2f3bdb0N.exe
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
e190f136725009ba52ee86f9f2f3bdb0N.exe
-
Size
223KB
-
MD5
e190f136725009ba52ee86f9f2f3bdb0
-
SHA1
7af2118eb056a1b5a31f94879281e6a0edab56ff
-
SHA256
c431b690c43f1b8bd0566e244bf0e9c061360b75238150a8f842e8bb68543ceb
-
SHA512
4738d2ec98e20b77a0cd777cf3b4a0ad2b1f8070f5cb697d435aa058a829f318e7fbf8c1157fad40ccc8b314c54b7ddbf8ab8877bdcbf2ba95242941dab2c81d
-
SSDEEP
3072:enay2fgzmaAFHWHIjN3tj6qnv0b2UrXkbvLq:wHT/IjNDv0bNXkbvLq
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2348-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e190f136725009ba52ee86f9f2f3bdb0N.exe