Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:34
Behavioral task
behavioral1
Sample
5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625N.exe
Resource
win7-20240704-en
General
-
Target
5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625N.exe
-
Size
83KB
-
MD5
d836c485c498341566e49ceb683c5f80
-
SHA1
8578b9eda82eb74cce21c1e1a5c6227d3e445645
-
SHA256
5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625
-
SHA512
fa47365222dd029797634d996f12ea38af8fb2fc0e0076f6e57e7417a562b39775604f8e96c561facd161125298ccc43ab016f0dd27452f21cfe86cc4c116b18
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2604-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2604-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2604-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000800000001211a-12.dat upx behavioral1/memory/2604-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2604-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c86b2ba314d8d4cb6e8a365e7d54ceae714aa45157dace64b94be25ee939625N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD597db1b82219bc66ed8805f77d0aa3bbf
SHA158c4c746f622b351890486b2e2d9c93d4994a17b
SHA256abda13fe066c79b1a1026be5148d39d66b5e4d0b71ad6ca0932370d2ccbb3a9e
SHA512dbb9d97147c07d77b2d5f9fd8927ee92cf5ddd50ff566de07b367d526bd7152f0aa6d942e3a2860bcdb06ce2644f4e63b4d88299d878edb60ef035bd7ccaf8cc