Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 01:24
Behavioral task
behavioral1
Sample
baa07dae12b1f0199451dc09e5ec4f1bd415e17cfb195996420ee75ba34045d4N.exe
Resource
win7-20240903-en
General
-
Target
baa07dae12b1f0199451dc09e5ec4f1bd415e17cfb195996420ee75ba34045d4N.exe
-
Size
83KB
-
MD5
18a75e0228c29ebf4ab8532eb5101db0
-
SHA1
2cca47cb966708a6ca6faa2b750b07baae7cc886
-
SHA256
baa07dae12b1f0199451dc09e5ec4f1bd415e17cfb195996420ee75ba34045d4
-
SHA512
bb5ede813488ac84192e2a9c01a2b60a4ff959bb4e2f6803e9bf63d75cfdc8e17c215228d1920a454005fc509e030530d3a39cde1c853b318c9d7b34e5ab7aad
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1928-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1928-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1928-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1928-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1928-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baa07dae12b1f0199451dc09e5ec4f1bd415e17cfb195996420ee75ba34045d4N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5733a8d6088143da80aca5058814eec2a
SHA15b17dee5d9ff36dc3ffcba3413617c36a40d04a9
SHA2563f0fe0f3dab60085a21190fd586a70165f2d25f58adca468cf5d7e7a91d2f5d8
SHA512a0910b040f2117aadaadfcbbb94e815aabf4a62f6444295ceb6ec7c739d6d4f193a705a54390726b4e982aa73ede1657f818c9ababfb9a6c0fa838208decf7b5