Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 11:44
Behavioral task
behavioral1
Sample
19420b1be054951c46e4db151fbe9210N.exe
Resource
win7-20240708-en
General
-
Target
19420b1be054951c46e4db151fbe9210N.exe
-
Size
83KB
-
MD5
19420b1be054951c46e4db151fbe9210
-
SHA1
ee7e0dc6a56ed7931abf63c588c90a20abc59a80
-
SHA256
c97702a90e47f90eacef6e484b25823ff5cf81dfb5e24a9c1ff4395f7f41c8d1
-
SHA512
3f546a8f12dd6bea81743f98cff602eee869a6ce9b161bb297c35853999c64c60e82a9b78de97352ecb15ec2bb725666bd04626ee9911cdc1c701662212d7dd2
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1560-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1560-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1560-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1560-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1560-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19420b1be054951c46e4db151fbe9210N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5dbad277665e7aba443a89c13b64faae4
SHA10340c7ba0c3fa59880509c826c9e261c6abe6432
SHA256d6e6ce57b3e0f7ba69c45c1df742b58a3d2f042c43e3dfbf19648f4ba3842fcf
SHA512f1990b85f28612f4eb336fb83f78b994e9654c779194ea0be931143c5e49be0ad42261b0398a978a3fcee803c97ebbf200318a9d465b88d58be997293e6c47c4