Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:41
Behavioral task
behavioral1
Sample
7cf673cff58b8336f3596e65223d0b69f022b2c8b80070575e93542fd2f37942N.exe
Resource
win7-20241010-en
General
-
Target
7cf673cff58b8336f3596e65223d0b69f022b2c8b80070575e93542fd2f37942N.exe
-
Size
83KB
-
MD5
cdc0801ceecc9a07c8fe5a988d977a30
-
SHA1
4d97ce4b621a67d0ac3bc7d1c8f89355e598e3f1
-
SHA256
7cf673cff58b8336f3596e65223d0b69f022b2c8b80070575e93542fd2f37942
-
SHA512
dcc773e5b43e5490ef7070fc91affa457772e7c8be2a92d2b702530075c3d3cb4b731b9845dd5ec9b2c19cd9e58382d3ca71f3871bd8521eb3ff4f8bc6bd6bdf
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+QK:LJ0TAz6Mte4A+aaZx8EnCGVuQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3620-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3620-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3620-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3620-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023bcc-11.dat upx behavioral2/memory/3620-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3620-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cf673cff58b8336f3596e65223d0b69f022b2c8b80070575e93542fd2f37942N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5a19c862357974ab93b05b56b90e4a1a3
SHA11a86a32cfa4ccff68c05149153549413c5e8e865
SHA25618fa52de04ea30274c7c8cbb7e903d780844633d70479130f3972e98a91b8df8
SHA51273065439fa50afd73c6702e27e1f84d52ef740c67636112d8852c693a25969b4506d5de65e8ce31439ea7456bc588f8c819aca91a42c7d3d31e5f9e781c695fa