Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 01:22
Behavioral task
behavioral1
Sample
e441d96618d553306f955b61f6fa193bd58bec25050dbd5b23b8d24647bd30ceN.exe
Resource
win7-20240903-en
General
-
Target
e441d96618d553306f955b61f6fa193bd58bec25050dbd5b23b8d24647bd30ceN.exe
-
Size
83KB
-
MD5
ba6bca51e39dface75c918acd87e62c0
-
SHA1
05a160f13a4b612111ee21c38a1f5439beb1f32f
-
SHA256
e441d96618d553306f955b61f6fa193bd58bec25050dbd5b23b8d24647bd30ce
-
SHA512
efa96f26f5cabc2baa1837e93c11bbb14c9d226c16388a2d8880baf01eac5856bf122e620d2b1cd22b0281bb08be3cbaf4ba40e591d1a6588f5be6d2fe749d79
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YK:LJ0TAz6Mte4A+aaZx8EnCGVuY
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2688-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2688-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2688-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-4DFQtJZDJZpWAUdP.exe upx behavioral1/memory/2688-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2688-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e441d96618d553306f955b61f6fa193bd58bec25050dbd5b23b8d24647bd30ceN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e441d96618d553306f955b61f6fa193bd58bec25050dbd5b23b8d24647bd30ceN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD53469b6af394f8cc00ff0bfbc95c6d567
SHA188949810c63b44e3b23d0aebdf3fb6a8e3ac2ce6
SHA25638eda55572d06fbbd5ab678818bc21452cea95bfe1d51432c3fe0781c22ad1a8
SHA512b487be79e19556238a2bbb68858284d4f45a411da9094553990ee3ceba2d9bd1271f632bb5d6b9c9e4d6b16c0cf9fb655a5365b83becc842ee29450409eeab29