Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:06
Behavioral task
behavioral1
Sample
a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7N.exe
Resource
win7-20240729-en
General
-
Target
a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7N.exe
-
Size
83KB
-
MD5
18b1758caa98d9b992ae56e3f57c30c0
-
SHA1
9bbe97103c93ba628ad65b42b6cefbdbae3e3ba6
-
SHA256
a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7
-
SHA512
77ec71560937e81da1f116b3254e73a8ff4cdc10c6e4f4b38f6c45f32cd3f793b3b2c91a4129979f8aee7e1c867ecc603b9efbbf93d6506e1421dedd3d7b356e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+2K:LJ0TAz6Mte4A+aaZx8EnCGVu2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2112-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2112-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2112-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2112-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2112-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a95d00463b3353fc84a7c752ac9a68c3ffc4a4f268cedbe5f923847a0ef45ce7N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD54e1aeb2808d82ea4d97a00663eafcf94
SHA1e17959240f7665d7ef1218686775eaa39c417233
SHA2564076c698a15ce67d5fd1a1a47b47f21c1fb2dd99f52e4e9a6d8147d8423ce4fa
SHA512e5e71196482882df480497e15eb4b8d2074bb95ca8f44564f30966ad452636ee33dcce6268b7eda544e54a02c2b8c2db0a3171a5e33f4d7a8f3bfebff243023e