Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 17:53
Behavioral task
behavioral1
Sample
fe54aee8ffbc2476979ad1bfe734cbbf638692faed6a37aaeb7a432532d10b2cN.exe
Resource
win7-20240903-en
General
-
Target
fe54aee8ffbc2476979ad1bfe734cbbf638692faed6a37aaeb7a432532d10b2cN.exe
-
Size
236KB
-
MD5
17619d3b978ac19d8f823069fb6a2b90
-
SHA1
2f42e858b3a63e63069d99d3c43c35f577ee9fcd
-
SHA256
fe54aee8ffbc2476979ad1bfe734cbbf638692faed6a37aaeb7a432532d10b2c
-
SHA512
e64ec2840326ff83afbdd880a153bbc811a79db7af3eb27fd19dc0b83549bf8a8170a9e9d55d708b24e401191c157966475d7971acb4d737d6a912fad2c56f79
-
SSDEEP
3072:WJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/t/FnncroP9:6wDeM7iNEkgiOb31k1ECZJ/F
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2596-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2596-1-0x0000000000400000-0x000000000043B000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-rydOKPsejXAG2aBx.exe upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fe54aee8ffbc2476979ad1bfe734cbbf638692faed6a37aaeb7a432532d10b2cN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe54aee8ffbc2476979ad1bfe734cbbf638692faed6a37aaeb7a432532d10b2cN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD51b1808c499b99fd67266f90066a9fa82
SHA1e8eeba507846371645637362db37d360d088acb7
SHA256e9d2edbcf53612902eed9633a5d68b6db37388e89a3972aae1f25111e86fec9d
SHA512691b79ee893d7b1bad313d321e475b13a28aa4f9283aee33dff79e68270794d0b93edf21302bf01868fc37d515b43b1fd6c76fd3589a1b544e7c3a9781a32519