Analysis
-
max time kernel
111s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 15:41
Behavioral task
behavioral1
Sample
18a124f841a18e07fd2c798f6554bb40N.exe
Resource
win7-20240903-en
General
-
Target
18a124f841a18e07fd2c798f6554bb40N.exe
-
Size
83KB
-
MD5
18a124f841a18e07fd2c798f6554bb40
-
SHA1
d737b66f1cedcf336f716a33bb52c04a2861c717
-
SHA256
198ea10d0f6b5a414ed8d7c4925c73939e58ac1a9ccd826572206ceabae05f7b
-
SHA512
64b1fe4bbd7a0ba9919f287845a06a89f4dfcdf406ef18759b18cb89ee1e744b68a4e035a405483f88d3015cb66649296e27e831abe4ba3b2cbf6ed7287e6b72
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+DK:LJ0TAz6Mte4A+aaZx8EnCGVuD
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2232-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2232-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0026000000016fea-11.dat upx behavioral1/memory/2232-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2232-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a124f841a18e07fd2c798f6554bb40N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5f71fe9c6c3e2f2a25cd841c14953f221
SHA16aec095ec2fc63117d9edf051c2ef45c3cf93bd5
SHA2561da2b0eda6a3582aaf9c842b3edb8b3a604c9750135d89fb72fff429186ef58f
SHA51243a30927cbb74160822ac72ef559372c6a7405bc4e1f3ca6939ad20c89c61d0ab2a114ca99574763d31b992721eb01ef4cb516a4ccc15f75f058fa13bc337d0f