Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:07
Behavioral task
behavioral1
Sample
26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
Resource
win7-20240903-en
General
-
Target
26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
-
Size
83KB
-
MD5
844e83ddcedf82e9c806f583a47d970f
-
SHA1
da2366a3dc46d0068d3ae79960adaa1ee724c9fb
-
SHA256
26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c
-
SHA512
11199180aba0aa3f5fb12916ccca47f9db9784703fa54c4c3ab0535c970360580e1d0fcf434ce346600d14f4a252691031b4d1c5fe6a517b0073c8abbbbafdbe
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+YKO:LJ0TAz6Mte4A+aaZx8EnCGVuYv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3044-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3044-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3044-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0004000000012000-11.dat upx behavioral1/memory/3044-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3044-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26bae1620503f97fe0131ad7b46727d355b4300b26b3e8238477e2bcab09a95c.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD571c0249ad9c5f245900f25ec71375344
SHA16de62fa8a06e6aa3ab02e05142dc4781a48bd159
SHA256692e7c8eca1e9824dc6e0e610b560231516fe9260445306b7824dce3519ea5a1
SHA5121d664d94faeb98ed56ee2b51fae007802dd854ac99ce26f977ad3dbcbe46e1ce14aa8162eb4eedf0243f44cab2a2ea5ba65af11ea959ebd1ca80be08bf2e11ad