Analysis
-
max time kernel
112s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:37
Behavioral task
behavioral1
Sample
e9733e8a0e23b039f1b9e2cbf21435c0N.exe
Resource
win7-20240903-en
General
-
Target
e9733e8a0e23b039f1b9e2cbf21435c0N.exe
-
Size
83KB
-
MD5
e9733e8a0e23b039f1b9e2cbf21435c0
-
SHA1
6ff0a02868789e711a84c546f7d1f20f0f81476b
-
SHA256
f195c67b5e218378983b247cba28db8e70a5616679ffbbb3d3c883651ed213d6
-
SHA512
9df60b173a5de8460918aa3de69daef0fa8b76399b7797422f08d24881cf5f248285137fa0786c454c3daa29f89698e507803fef8e50cc099a3af364f3037783
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2364-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2364-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2364-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0009000000012101-12.dat upx behavioral1/memory/2364-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2364-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9733e8a0e23b039f1b9e2cbf21435c0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD599a02274fd4c8ba131772855396c2b57
SHA1cb56973c9bdb1c168c202d9d82877570c4114297
SHA256c42ebab1b8cab3fa5b507fdaf29b5857257d15169f9c71a7fac2960b1ce16aa2
SHA51284d94da1dec3e3d4e8b3c35ec3b2cb913b041c8b0c2a0d1b60c22957c175b1f8b3bf4f387ed129ad801083c24c077d16b7d64f785b07d824d3eea8a364d1ab7a