Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 01:53
Behavioral task
behavioral1
Sample
8a379ae0e771a7ae445fb2c137a7d9f89fca7298ce544a2dda898f462ebc9fe6N.exe
Resource
win7-20240903-en
General
-
Target
8a379ae0e771a7ae445fb2c137a7d9f89fca7298ce544a2dda898f462ebc9fe6N.exe
-
Size
236KB
-
MD5
ace4f6985e60acae0d1e1f5ad44f03d0
-
SHA1
f3d3cbd62d6de06d4a5143e512a43b7f08937403
-
SHA256
8a379ae0e771a7ae445fb2c137a7d9f89fca7298ce544a2dda898f462ebc9fe6
-
SHA512
7487025f6323acca37eec55a7bae12bbd0d402edfc7c6a171ac9d7eede2899dea9404bb9ed9f02417220adafd13dd4db655dbcca5f67fc754ac829d6c4a7ed62
-
SSDEEP
3072:eJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/6/FnncroP9:iwDeM7iNEkgiOb31k1EC8J/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2100-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2100-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0004000000013d08-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a379ae0e771a7ae445fb2c137a7d9f89fca7298ce544a2dda898f462ebc9fe6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD577895c886e8f02e7e88118645ea340e1
SHA108c2230361047efc6ac6a53d7a8767298786aaf6
SHA2566df7dd44bffd8c4849292f9d73af053edc807e3c65bc65e1aa96cae2678a2b30
SHA512c84b18d4e191bd68dcbe3b2460b4ae1f51ef6b2eb4a775e204773d3f13c40075eb54a01ccbb7b68e3195ac7a8ba137b01edf4e631400583554da5e9bd513c6ed