Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 07:26
Behavioral task
behavioral1
Sample
79a7298570b4b6451f6764e1677534abd75066f6fa82bb2103ce2b9b254fc29aN.exe
Resource
win7-20240903-en
General
-
Target
79a7298570b4b6451f6764e1677534abd75066f6fa82bb2103ce2b9b254fc29aN.exe
-
Size
83KB
-
MD5
f215cece83154e82b7cf6c075233ad10
-
SHA1
469f939516efed0b1297727786f983ca10a87b6d
-
SHA256
79a7298570b4b6451f6764e1677534abd75066f6fa82bb2103ce2b9b254fc29a
-
SHA512
f057e28aa82d48394701fc02cded3be9a9a0458c86d409d2e115360d3b1995c64dd391f66ef4f0dfb9a73fe75a93f73c50e0405e1ba7892f99dd6b8d9071231d
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+8K:LJ0TAz6Mte4A+aaZx8EnCGVu8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/604-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/604-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/604-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/604-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/604-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79a7298570b4b6451f6764e1677534abd75066f6fa82bb2103ce2b9b254fc29aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5073f381899c4941ba74173f10b700da9
SHA15d3306babf479a78dbb3499c445f60d296c1e9f4
SHA2563ac2f0e085ac2b509cb19a3c59b4068a65328d6570c263e0b5aed6f875aa8c2f
SHA5123d40e77c1883cb38fa716ff8051cc15ebb3a5213e267a647861e6da1de2503ab9e94c825265aa413265c0b66a3f80aadba0c2fbbdb67c2f6bfb98a814aba1225