Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 15:24
Behavioral task
behavioral1
Sample
fbc455d159d9b60f6fbc02138ab52689ee47ab64612edd5d5ae10d77ea53a3e7N.exe
Resource
win7-20241023-en
2 signatures
120 seconds
General
-
Target
fbc455d159d9b60f6fbc02138ab52689ee47ab64612edd5d5ae10d77ea53a3e7N.exe
-
Size
120KB
-
MD5
5ac617d4a248794c2d1f082871e3af90
-
SHA1
5699aae02501579e70a69d9245a8c1b3563e63dc
-
SHA256
fbc455d159d9b60f6fbc02138ab52689ee47ab64612edd5d5ae10d77ea53a3e7
-
SHA512
3fff3c57039b6006a2d276f649b6da151749bf0a31154f8da38054e4e30b24e4190c28f5b2e016c197f03a47d3fdc98fd24e417e639d5116a0d6370bc1a4d856
-
SSDEEP
3072:htEe9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6Pw8:fEe9iMGsSaOyiL
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2064-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbc455d159d9b60f6fbc02138ab52689ee47ab64612edd5d5ae10d77ea53a3e7N.exe