Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:39
Behavioral task
behavioral1
Sample
7296bca7987d03f3824e3df7f0c22f0d43938bbb661e52b55c315e2fdb6657e7.exe
Resource
win7-20240708-en
General
-
Target
7296bca7987d03f3824e3df7f0c22f0d43938bbb661e52b55c315e2fdb6657e7.exe
-
Size
83KB
-
MD5
62ebbf3a3c5932fd5398af4eeb714b82
-
SHA1
7af7eb2cef5e3fd598bf00198658a55e1f191a55
-
SHA256
7296bca7987d03f3824e3df7f0c22f0d43938bbb661e52b55c315e2fdb6657e7
-
SHA512
7749cfe38f9f67378d5c7275f08f98824869fcf1dbbabd299fb13d69582fe4dfa44035f3d22a449ba8af1fa40afdb8331936600bf310cdd96eadcc34b1a5d4e9
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF++Ke:LJ0TAz6Mte4A+aaZx8EnCGVu+3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2296-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2296-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2296-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2296-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023ca6-12.dat upx behavioral2/memory/2296-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2296-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7296bca7987d03f3824e3df7f0c22f0d43938bbb661e52b55c315e2fdb6657e7.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5c17828738de556dae384c40bdf22eb32
SHA1560868adab6d3c73d21f4c6cdfff0eeaa96800c4
SHA256834ae116b8e3a0b06c487f5776a084b588d1c2643cb9ef1224185cd3c9a099c7
SHA5122af54c7f3d8ce7c1ce121d6d502b4c42c75a8f48be16ee7ffca9a728937d2394d3622ed3f14d2c3a48ec38d22f7371e4ac2a8a0807a991775620cb352959ac43