Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 07:18
Behavioral task
behavioral1
Sample
1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4dN.exe
Resource
win7-20240903-en
General
-
Target
1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4dN.exe
-
Size
83KB
-
MD5
f500c17e206de1d54abbf3c89c96d330
-
SHA1
88450c8aa95b97eb9acf476b43f6e1aeb65369ec
-
SHA256
1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4d
-
SHA512
b4b34776a4b44ae1502c7e20df53fcc1a3c8fe0f07d609d113b672bda505e2a72c81e0861207a160ed9d0c70c7e0ebfdcdad1ce51cf4588888f76e6343b58496
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+qK:LJ0TAz6Mte4A+aaZx8EnCGVuq
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1868-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1868-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1868-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0004000000013d08-11.dat upx behavioral1/memory/1868-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1868-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a884b7fb5417ac8d3efda2135ffd3f10fa48bf238751a75576e632bb31cbf4dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD53a5adef7694c9b9d19891e05e40b767a
SHA1b4fb8e1391a685960dab593505c4cf5bc0848290
SHA25674c091b46f3dc4b8f067d71e745f8799fa3e8a01602ef9f6eeef9b8d2dba5b38
SHA512e4594c2d5df768408478390ca9d9fc6c1d9df63be26544fb7826236c2a6d70262ad1993eb5bfaaeecd0f40f5b5211aef7f391bc0e61854184b3772d7e82edabd