Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 06:07
Behavioral task
behavioral1
Sample
2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5N.exe
Resource
win7-20240903-en
General
-
Target
2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5N.exe
-
Size
83KB
-
MD5
63c4ae2524197bd91bd3b09ce61aa630
-
SHA1
9afe1c61e3f6357429285cbe4dc8dd56dba75a9a
-
SHA256
2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5
-
SHA512
a1c9240840d72195e0cac1cb2186c84e6f4cd1a4e783359be2d6c35ff87fb60f8e53f5bdbe43f1d1443ae9e4210017de00eca58bac562d5ff42df429bd655365
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+RK:LJ0TAz6Mte4A+aaZx8EnCGVuR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2376-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2376-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2376-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000c000000012256-11.dat upx behavioral1/memory/2376-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2376-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cb9ba28b2aacee1e8e79e803bbd6f38600fbd4acc4845755ebb9e51c9e13eb5N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56ba25316d2c789fd3049b861a4a973a2
SHA177f789565f948fc15d6c595724e792eae519d473
SHA256aeeb1ae66dec822a8bfc39b8a3239448da74f43248125416bf8c90a88a8d8c1a
SHA512359aa593537fc4741cb4b163329bba4871def0bd1c63bc749aaa246deff1548099db879dd4d48b63c4d5c0aa4a1eae2428559203114a385ad347f0beb55e67cc