Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:55
Behavioral task
behavioral1
Sample
f289ae0c73296b924f0abf88a7ae1ed86323c0d546dfcfea3ae9f6bf2c87fdd6N.exe
Resource
win7-20240903-en
General
-
Target
f289ae0c73296b924f0abf88a7ae1ed86323c0d546dfcfea3ae9f6bf2c87fdd6N.exe
-
Size
236KB
-
MD5
dfc2ab7ea6b6202094ad0d8e50128420
-
SHA1
0d69b98efc10a221970f3d0434929dcef98c80aa
-
SHA256
f289ae0c73296b924f0abf88a7ae1ed86323c0d546dfcfea3ae9f6bf2c87fdd6
-
SHA512
f1b5647bf71cdce30c73761f35748d01b37002b4c0e89742eb0d15e2462cbd77ff20ca518cb43b5e38689444994a50d52a0bb565ec59024efd9cb2129c1735bf
-
SSDEEP
3072:DJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/y/FnncroP9:FwDeM7iNEkgiOb31k1ECUJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2760-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2760-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0003000000013d08-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f289ae0c73296b924f0abf88a7ae1ed86323c0d546dfcfea3ae9f6bf2c87fdd6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5c2ce6c9aaf11396c7f152322b2bc5fe5
SHA10c77f6cc1b04a04d94b6cc707ae50b556e066c75
SHA256cd2990e7dfbcd65c1c21557a6ccd4dae5997543ad453597cfafa95974713e9e3
SHA5120d018e77e9242cf6675cfb8c68edc4c47757f94e13e414197ccb66f5e00c42d1208e2868d763c87c056e820da1f777fbfece68c7b2bfa2b144e796a330f4aa7b