Analysis
-
max time kernel
110s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:14
Behavioral task
behavioral1
Sample
390977585ee902aefe1a3a2dbea6d8b03fca07112e2dbd40e4121c191261b4ca.exe
Resource
win7-20240903-en
General
-
Target
390977585ee902aefe1a3a2dbea6d8b03fca07112e2dbd40e4121c191261b4ca.exe
-
Size
83KB
-
MD5
0a85c676aa70f32216ae9fb2505fbf3e
-
SHA1
f537d16671bf990cc7fffec7480a35ad7954e55d
-
SHA256
390977585ee902aefe1a3a2dbea6d8b03fca07112e2dbd40e4121c191261b4ca
-
SHA512
7a5e7335228ab7a004345b37d513784e9874fee6ab78378027f7a3514a85c6d7f479d8d009c59daac3b8a110d3bfe91c3cb10aa1f9df229ff60a171c1983ce0c
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+BzK6:LJ0TAz6Mte4A+aaZx8EnCGVuR9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1204-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1204-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1204-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000a0000000120f9-11.dat upx behavioral1/memory/1204-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1204-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 390977585ee902aefe1a3a2dbea6d8b03fca07112e2dbd40e4121c191261b4ca.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bc651d1a85f5f724c9804554d2e81f70
SHA1aba0eeea9d23990880bcc365dc21ba5af55248cf
SHA2564b1f3ef7ca25f7a96e204a1f89c565050a5dccb23e4ac95b047d3690c0214681
SHA512c260142965af17223ecaa08a36902da524f2fb1ae29e1a6c261692ccc591ed965e754c580ed15da22ee09540572b9ba2e6595c52aa8794bf1947dffff63ca5dd