Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 05:57
Behavioral task
behavioral1
Sample
542ef16d01d2ca67d2388848241dc970N.exe
Resource
win7-20240903-en
General
-
Target
542ef16d01d2ca67d2388848241dc970N.exe
-
Size
83KB
-
MD5
542ef16d01d2ca67d2388848241dc970
-
SHA1
ac8e35f0876d6ea7616ed04d3aa815b3a62f94ac
-
SHA256
ef05047a455cf5881bc8613a53a6920be8b20ca6a4376b1f85132e791a83cfb7
-
SHA512
2a6f5e76e4a182f2ecaaf48c08a787866a5a651795114844d7b2db281ca52725eb208eccbf8a156909285ee445d9d943abdf626364adfad2b9946c0ca376c9d6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2380-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2380-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2380-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2380-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 542ef16d01d2ca67d2388848241dc970N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5dcbe6cc1a2ae1165fa25cce50de5cfca
SHA1d23eb696c36dd72fb45d2b7707e8326c2abb3689
SHA2566f0f9702ad2bc7a600aca48a26a2d7426debb28a79bc3491bef1920d4aaa076f
SHA512dcc81411aaab98ae5985d7fdcf562b771323578ed740e5d5a0c31a57be9d61ea0bc9cf81e172aa60e0df12763d7772a505f9edc89a32680067264d3425d9c25a