Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 17:37
Behavioral task
behavioral1
Sample
bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840N.exe
Resource
win7-20240708-en
General
-
Target
bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840N.exe
-
Size
83KB
-
MD5
891fb7ad4ae355d311232ab9c55d7950
-
SHA1
cfa7f9dc2d2f4ff787bae71f9bd26e3248509359
-
SHA256
bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840
-
SHA512
01594404c0af389b22da4800864f8d01636b988afe7a6faca93eb00a170c1ee8f5b4e87d60aef05ec322922e3902b06d4127f7295f294cc7a4289c23c8b2b74a
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+sK:LJ0TAz6Mte4A+aaZx8EnCGVus
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1628-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1628-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1628-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0006000000011c2f-11.dat upx behavioral1/memory/1628-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1628-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd2d77283b6b85762dcd908f6cd21808a021f116bc4333936517a9d935455840N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD52f7e9df9c71e25dad87d1ff77854c7d6
SHA1ed29517635cd433cca47f97154d7cfa18539df99
SHA2561ab72883d1f088c82e687451b1dba3e645e7a148ada50c1df4c90b83b28b6091
SHA51213029a4bacfaaee0e76b5386713d9c620a2f0bed31d58c1e45cdab744582a88cf8a30a63e46d9220acfb3c3a4414bba42ddf5fb42756e9e1c2b2c427eb70c6b3