Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 13:40
Behavioral task
behavioral1
Sample
a1dbd46821c8e3a7dd1977b02b1e5f5e225c507bb49257edef6b8acfa67ee477N.exe
Resource
win7-20240903-en
General
-
Target
a1dbd46821c8e3a7dd1977b02b1e5f5e225c507bb49257edef6b8acfa67ee477N.exe
-
Size
83KB
-
MD5
1c7f4eac7075916c2c57180a712b4280
-
SHA1
f7a014d26b3ee24025a8482dbbfe307ef6cd55ef
-
SHA256
a1dbd46821c8e3a7dd1977b02b1e5f5e225c507bb49257edef6b8acfa67ee477
-
SHA512
69b31584b1fe771ababf25f703579ca920167431eb7ea783eb005ef2b3e62a9422d435579ef2c0252065f10520e3d3bfbf262a61b4d3c98c3b129e4658b77fde
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1420-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1420-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1420-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0004000000012000-11.dat upx behavioral1/memory/1420-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1420-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1dbd46821c8e3a7dd1977b02b1e5f5e225c507bb49257edef6b8acfa67ee477N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD57d096c095a40a46fe7aa7e6764c2a234
SHA19aad76c383b497edfb19d9ba821700592fc9848e
SHA256a88f127b9d7d6e8a20e0b7ee2979ad9c3985733c00262002592e38584f980289
SHA512fe4e17cd85a727019a58426ded3c77e8c3504d4ccb0c1a2f31c55692d07b143985650319ee1ec5ff5b8d7bd20e5eeb40d0171cf98ff85908f71f91064427823a