Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 11:36
Behavioral task
behavioral1
Sample
f29f8af12411e67d4bd02be80b797fa2ab03b1d59d8527623e8333a08befabaf.exe
Resource
win7-20240903-en
General
-
Target
f29f8af12411e67d4bd02be80b797fa2ab03b1d59d8527623e8333a08befabaf.exe
-
Size
236KB
-
MD5
821732d4ff0def39cb3e429bf9f669f3
-
SHA1
8c2c45690c3b7273c01e6f3c325ffd32c1094cc5
-
SHA256
f29f8af12411e67d4bd02be80b797fa2ab03b1d59d8527623e8333a08befabaf
-
SHA512
2bc49f766ed3d37897fac0d31ee1d840c7e5eed9fa666ea2e2e9928c2cfdf007e77590fe904d9b46f117dcdaa269951e4cc09ae6e0d2d5118343b2527e0566e4
-
SSDEEP
3072:qJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/d/FnncroP9F:+wDeM7iNEkgiOb31k1EC5J/FF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2416-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000004ed7-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f29f8af12411e67d4bd02be80b797fa2ab03b1d59d8527623e8333a08befabaf.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD54c306fe0913aa2d4fca6f95fc56f3f8d
SHA15ca56212023191e831227a5c261898974eaa9bae
SHA256bd5d6d4fb324086844baf2816d3d556fdddb1c7abc24d55cceb57cc905d36e4c
SHA512621698b8f9f7f4b331bceeebd9aaa66ad98620d4d6b31efaed6ff7c37c259982e6a296290a6c94772bfd7bfd54e898e72ac937bc1239dccec5ccbbff120a8890