Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 16:38
Behavioral task
behavioral1
Sample
4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
Resource
win7-20240708-en
General
-
Target
4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
-
Size
83KB
-
MD5
723fbca23bef03d03ade1ed56ec32420
-
SHA1
35a444c94998bb78db1c2bba4e832632cd7decb9
-
SHA256
4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3d
-
SHA512
5b9e9a9ba5515832f0d3d750ff86eddfceaf84d044f7a6396b4ff1664d4f47adccf5238f083807719f315ee886e7002db91952c343944d0ca270ce49809959d8
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+rK:LJ0TAz6Mte4A+aaZx8EnCGVur
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1716-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1716-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1716-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1716-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1716-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d799599c4e741aaf5cd83b01ec0c6235d7a7fb4849459bfad2e93f0790ced3dN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cb9dfb712f606d17f6b332da3b69eee5
SHA1743af2965951eded75b4c5dfe46d7b140e4e13cf
SHA256d2242c919516eb0a6e43564f9d1956eb20cca6e884dd7628341849a30f177252
SHA5125b1ff424075ba38a22f1cac34c5965a6d30a607b14a16c522118a20f9b6704a774d0b0199db590e91d5f517d71a9d7d1c14fb729b0f58f874237e69518517378