Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 13:22
Behavioral task
behavioral1
Sample
9bc54371595fdaa0cece250caa656b6ed15ac79f2bf3ef168fb0f5dcc4240450N.exe
Resource
win7-20240704-en
General
-
Target
9bc54371595fdaa0cece250caa656b6ed15ac79f2bf3ef168fb0f5dcc4240450N.exe
-
Size
83KB
-
MD5
2128c895bb6a1d3fcb92bba19ebc9eb0
-
SHA1
26705047c397bc94b806866c0faf0532cd172c8c
-
SHA256
9bc54371595fdaa0cece250caa656b6ed15ac79f2bf3ef168fb0f5dcc4240450
-
SHA512
b19ab50ae076ee5588c20054c2dd55413d92da599d7e90e3ccce5a8bd0b5b4f9c537ab298d1a1462bbdae2b88794a3dd3372e26dcdcee8801f74c783c4022403
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+oK:LJ0TAz6Mte4A+aaZx8EnCGVuo
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2716-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2716-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2716-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2716-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2716-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bc54371595fdaa0cece250caa656b6ed15ac79f2bf3ef168fb0f5dcc4240450N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5acad1263d3777be0948268f6a30b7797
SHA1cf873285477a927d5addc6ce7c631e6b94e4f654
SHA256bc0509333b656fa7850bc7b1fc153ee0d941dcf55fa91709a47e67366518a4a7
SHA51289ba740be8382d096103a2bc441c4be506cc1588b9b4dc14a01027daa988e92c346b11a9286fda0b779ac4fb7837a711c791c8d4ab33368a17716b2ee17c7d9e