Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 23:15
Behavioral task
behavioral1
Sample
8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46fN.exe
Resource
win7-20240708-en
General
-
Target
8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46fN.exe
-
Size
236KB
-
MD5
f774097759e02ea22b9c7489e6067d70
-
SHA1
9b02bb2151fadebe7280a33f0525f769f2510a46
-
SHA256
8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46f
-
SHA512
2f653e7bc2d2c509faa2e912ce9151ceb7e8bed9845c29925eca054543903e2052f8cb5ce00fa3b70e5dde85edd021df387c1978b450fa0cc2c8a9446152a8f8
-
SSDEEP
3072:nJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/x/FnncroP9:JwDeM7iNEkgiOb31k1ECtJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1700-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/1700-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cae8be1a1d3c1f4b51a2d2639d3612fd50c541b73e3b789968d2663d2e4c46fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5f04c7ec4283e2e80dff7db564b3de66c
SHA1fbe303d7fa2ca767e24156a8b2904a3fdb9bbd9c
SHA256659bdec727bc81584417ef0a43bbbb0326a2dcdee83a5d055e13096c724a3282
SHA5127e86ba78d6ec93a08577fff0ba678bea0748d8a4f83bf11af91022984509242248b9d905c90b4e7a47da7278559db57db60a8c3bcdb251adb5a2f2f12a04abdf