Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 16:59
Behavioral task
behavioral1
Sample
f779298e0bf2e6ed0811c94418788c87333627c6038c020df3ed120afe584940N.exe
Resource
win7-20240903-en
General
-
Target
f779298e0bf2e6ed0811c94418788c87333627c6038c020df3ed120afe584940N.exe
-
Size
83KB
-
MD5
8055297ea730e3a84d9fd3a29b4bd4c0
-
SHA1
ba32c809b016840679039cb3bb5e4fb39b7c072a
-
SHA256
f779298e0bf2e6ed0811c94418788c87333627c6038c020df3ed120afe584940
-
SHA512
61858ae71537c441f70dac4ead63df6d3c2f931b501a2fec4a3918b62803d1c9f1981fb63c39fada84b69cf0cc1182ae33a03af7f302c62c81ba2461f2d949b6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TK:LJ0TAz6Mte4A+aaZx8EnCGVuT
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2788-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2788-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2788-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000f000000012275-12.dat upx behavioral1/memory/2788-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2788-20-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f779298e0bf2e6ed0811c94418788c87333627c6038c020df3ed120afe584940N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5747e89eb535a39ac6dd8b0048bba39c3
SHA1c96303a9e457bd9f2b490acdd9924d44adff8a43
SHA2564d52bacb75b0c37a7aa9364465508bcf2579eb3225214413f61fb67e858bced3
SHA51248fe8b1189560c773de5b5364635519a7b4d65aaa7e262f3d5ed0982bdc3458bf473540c24d77bd536003c2172f963e9fa54b9551162d29400ecb456c11e393e