Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 19:17
Behavioral task
behavioral1
Sample
3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624N.exe
Resource
win7-20240708-en
General
-
Target
3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624N.exe
-
Size
83KB
-
MD5
af0f461b6fef0f27d5961a826b1d9cd0
-
SHA1
a13971a5e7a4f40d1356156c92d4e20f3625e42b
-
SHA256
3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624
-
SHA512
d8b8c6c309d746f195bdb404c1113a59f98e90cddf89c8d600544a79992966cb07a4968c5a7f3f1d2752dc452e046cb9b336761809eae103027fdd9d163b667f
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1676-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1676-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1676-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1676-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1676-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3313dc532336fc0dece312719c4235825f46059fc89d222d5b72cab5e6b0a624N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD54151a5ba42a11c5be18fd69ce2bbd0f9
SHA15b124462daa4b00debebb97db532e548e3468e4d
SHA256ecaa8c3f43c6e95354c7d2fbcf9cb26d43c105c3f65ed6aa7027cd3878b9245d
SHA512560db9bc1c34bc0700d5e3c16cebf9d3190fcdfb0bc291513ea4c294185fdf1342fd7ad05a5430f34d0ae1bd11d5f041c752b5732a12e2a90d70f1847e6a69b7