Analysis
-
max time kernel
144s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 18:17
Behavioral task
behavioral1
Sample
PCAD 2004 SP1 CRACK.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
PCAD 2004 SP1 CRACK.exe
-
Size
18KB
-
MD5
b5be6a7235ad9e00d8bfabf5cd292db9
-
SHA1
f4124e1944435f94e55d8f3f54c1135e9fe0e0e2
-
SHA256
85beb406845c744f7105ab65add81da74a26c72d9ab094b09b67c67e7e38edfe
-
SHA512
4f61d678a7d600a2034388478e3f7315aa991db4d18cbb25c449c818c44291314e8f8df86a2e4aa5baab120cd88fd0251305b23169a80a1f8a638147e0c98649
-
SSDEEP
384:pLDTs8hsF6qtK8lzQ8+Sych3mYvCPHxFbi:pLXVhaTtDE8VfCPHxo
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1956-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-1-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-2-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-4-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-5-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-6-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-7-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-9-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-10-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1956-11-0x0000000000400000-0x0000000000413000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCAD 2004 SP1 CRACK.exe