Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:24
Behavioral task
behavioral1
Sample
bfc71cc14e0f82ac6c6c80c0f90076f0ff8314b24a18ccbacca8deb7e6ee8179N.exe
Resource
win7-20240708-en
General
-
Target
bfc71cc14e0f82ac6c6c80c0f90076f0ff8314b24a18ccbacca8deb7e6ee8179N.exe
-
Size
83KB
-
MD5
6ccc5fae5782375c4282ccfdcb5f2d40
-
SHA1
de1325f997d69e6e4bae18b15b2406246e8efd0c
-
SHA256
bfc71cc14e0f82ac6c6c80c0f90076f0ff8314b24a18ccbacca8deb7e6ee8179
-
SHA512
db612096809ab62a056ba734c74d5d2ab1cbf8f5b83197397b6213b4b0eef7f224f7e1cb17ce03f8b9457885dabef77834f59247a4673281f65c749a30142038
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2860-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2860-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2860-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2860-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2860-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc71cc14e0f82ac6c6c80c0f90076f0ff8314b24a18ccbacca8deb7e6ee8179N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52b04da5694730a7c8368393c7eb765d1
SHA1e945cc3f2e9b540f7de866845518f0d980e00055
SHA2560f97864c5bb08263711ad15a1ef8aa8ce02ac4632bcd1097e6bced1cda559ed1
SHA5124715fa568d7c6af9d50388788e1232369f4af1c2354a87594f9adcda143fbf02e57f4fec94aff09dc1ead7cee4eaf31e89ce494c7364a590e3c62dfd05fbd7bb