Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 23:57
Behavioral task
behavioral1
Sample
79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8N.exe
Resource
win7-20240903-en
General
-
Target
79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8N.exe
-
Size
236KB
-
MD5
0bbeffb41c7eb7fd85873020a16311f0
-
SHA1
d5874674dbcbc44847a54a50a70393eb9cad89eb
-
SHA256
79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8
-
SHA512
b2c167b1a8d647a4ec84f84a1e67f3cfa1b1a7b2b1eb078e4641c2741b66505fb551a0b9ca9c7a1ec881c3ce0dd6d19d6a915b7169fbb3dc1887ba2df1efd12a
-
SSDEEP
3072:ZJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/6/FnncroP9:jwDeM7iNEkgiOb31k1ECsJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1632-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/1632-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b29826d36b027ebbb0f52d9401c90bc27d9f5ae5128c56aa2a87525c74a2f8N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD50d593c8394f08899fa4e06b0417c182f
SHA1ce0fed747dce27c0e4a43c6c8841db73bfbf9bca
SHA2566219034e84b5df45314f3c1d1d4e06f2d3be7b0418deb531d09bbdd8e8820dd2
SHA512826bbbfaadad465a9012265ab72e338ac216ce9608360201cf425756ee7fde25f1823a5b28fc2d87cd877b2626258f8858ba06cac000544ed69cf1e442db9307