Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 08:06
Behavioral task
behavioral1
Sample
ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226fN.exe
Resource
win7-20240903-en
General
-
Target
ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226fN.exe
-
Size
83KB
-
MD5
609382682ca5c0cbf2838e74c5f1e4e0
-
SHA1
2426b87e37780e65606862c904e107cf4c78c2bd
-
SHA256
ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226f
-
SHA512
0dc26631c8daeb241654d3fbec46d6b71bdae36b09aafad85207373d490699569120fe6064acf46a1f1751849a6e8fb9d738f7ebc2dbf798a037621bfe456b60
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+wK:LJ0TAz6Mte4A+aaZx8EnCGVuw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2496-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2496-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2496-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2496-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2496-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae1d01ec23deff33aec977b13a8d3cf329112e6c727b5a243d39574e23c7226fN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD520044349de63c489ffc07032b1b65a16
SHA153f54622ffd57826ed1fa6485d2aa6efc0351e28
SHA2564918d738f9210145b6b1ad6528de20bc64613d21aff96ee131ed55ca6f3be040
SHA512c334bb9f122bf0cdc159a16df151f9d08ee248353816473298744077a169283e74ffe39fc4031f1ef2f8b2d6b6dd245710c710c56d09954c6c987a64d66a5157