Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:04
Behavioral task
behavioral1
Sample
d66cfc40cdbff262d4dfd2e1921974f0c72729338eb1332a54a5a7636b3c732dN.exe
Resource
win7-20240903-en
General
-
Target
d66cfc40cdbff262d4dfd2e1921974f0c72729338eb1332a54a5a7636b3c732dN.exe
-
Size
236KB
-
MD5
257996fb99d85811c20970a3afdceef0
-
SHA1
a9f702fd8be197d319f9addd917f6c0820fb5ff6
-
SHA256
d66cfc40cdbff262d4dfd2e1921974f0c72729338eb1332a54a5a7636b3c732d
-
SHA512
008741c008e22ebde08a26a312d8203a3108cdc1536330efc0c92e71c41cd98874d5692206f21980a34868629bc2bfde0d59f9ac8bb535f2ed91bd20a11b3aa7
-
SSDEEP
3072:lJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/q/FnncroP9:vwDeM7iNEkgiOb31k1ECsJ/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2688-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2688-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x000d000000012268-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d66cfc40cdbff262d4dfd2e1921974f0c72729338eb1332a54a5a7636b3c732dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58cc07b46ca335becbc74ddcf4792d8a6
SHA132ede8dc6e4c9be9f8d03daf458bd64b3405a39c
SHA2560136f9410b05d7e45e63a46da3570d8bc10c9dfe234f9ee5a6f5244f5bf14be9
SHA512cd0b88aca47c1563fdb867b5bb4158d52332131874706baeef50cd545b3799e2d60206940622cbf4dc062d09a186e8fca66382575da1b6d796723037785178ba