Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 09:29
Behavioral task
behavioral1
Sample
6b46c45a434c41a8c7d10953fda7f560N.exe
Resource
win7-20240903-en
General
-
Target
6b46c45a434c41a8c7d10953fda7f560N.exe
-
Size
83KB
-
MD5
6b46c45a434c41a8c7d10953fda7f560
-
SHA1
5d63e42eb57ca88948f86618b35fa995f23a4a53
-
SHA256
7a75c9915b994bfc062f222ba0e25ef20b158e40ae819b99e0bb4705650b3d94
-
SHA512
784547728f39260a1b67c5deba50b6b62e3c2c39b4e6ad9622eb8a9008144c1816016a0770aee18bc3b7718c3aab3b8e38c3d808c5e2e6a4d942207ed5c47bd0
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2712-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2712-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2712-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-12.dat upx behavioral1/memory/2712-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2712-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b46c45a434c41a8c7d10953fda7f560N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD543d624e5a8155e2a31f50be8e723c83b
SHA125d5f12b6674094733a256f738a746d8f5530874
SHA256c48f35b722dca23fc229d030ca39b703f2bbf65790cb2f37e948a22067339c29
SHA512065454bef6745d5141895e76d6043126409d021fa86d39e85b2343b4d9675f90b8758619f488a58a54310a9a7e2cc23872eef5242097d275974c4ac65c7b9330