Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/11/2024, 06:53
Behavioral task
behavioral1
Sample
3e506e1dd6b9df016d5672b01879a9e0d20373ef24e66fdf9e5b36c6e534dad0N.exe
Resource
win7-20240903-en
General
-
Target
3e506e1dd6b9df016d5672b01879a9e0d20373ef24e66fdf9e5b36c6e534dad0N.exe
-
Size
83KB
-
MD5
3d2f5d7ea4f98c01be654ce5c6c2d680
-
SHA1
77ea29b149e00ec0f818aedc3b9f12b7f9f00ee8
-
SHA256
3e506e1dd6b9df016d5672b01879a9e0d20373ef24e66fdf9e5b36c6e534dad0
-
SHA512
ce4a900130658466525eb6913d6f1d2c6346a98935db18c61a4bd409b274f2e7deb192afffbed0c9ac46873ed4edd1d44e630d289dbbdbdcb070ae7fc9d85bb7
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK:LJ0TAz6Mte4A+aaZx8EnCGVuf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1072-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1072-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1072-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/1072-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1072-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e506e1dd6b9df016d5672b01879a9e0d20373ef24e66fdf9e5b36c6e534dad0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD510e7deee170d30239cbf5d7e0a34d665
SHA1b8c5877205172c3e4f8973a3f52cc737ec64eb42
SHA256d264eed26626a1f0add89f327c8f4ebadb537ad26f4b366bb2445d1b654219a3
SHA512ee2efa16da8bee9727d5fe8cb3cd0c073903e579f4f66cd94961ae5913143c90875c0972888e67c33fae4d31a733bc55e88e1870e81e2d82e3273ce9b4e82cd8