Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 01:33
Behavioral task
behavioral1
Sample
1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exe
Resource
win7-20240708-en
General
-
Target
1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exe
-
Size
83KB
-
MD5
4bc24c9ba5525617cd726f8ca1971510
-
SHA1
ac4b0b6fd09aabe1036a8146d587003daf7e980b
-
SHA256
1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90a
-
SHA512
aa7fdcbbd477461cb2a77515c8a41806f1602103253fe0959fafda7f416086f81a02631c3e99eb1023e57cb5acd9a5befb348f83ecc71bfb346d102bed2ae571
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+vK:LJ0TAz6Mte4A+aaZx8EnCGVuv
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2992-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-5-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-ZpU6Mwh6eH7kpg9t.exe upx behavioral1/memory/2992-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c9f4d59ec4ae6f4bd9ecb79c431384869303a1e12c60e6d00afed26a015a90aN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5113749c1fb1ac98ba666291ab0c152f1
SHA1be584d3a1b3aa2e2437c3f56e19e35692698a63b
SHA2563f9f11c7767bd8435c42743364b96a2d580c787672eeb36e17cd50123de0871d
SHA512d7a38b128a086f04f7f0d3f80df5f13d5fdac70de29e84d5589c232f3cf8975481515df8e583205a2f73b3bb02bcce7c535ff8757a7750a27aed63fd149beecc