Analysis
-
max time kernel
123s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:17
Behavioral task
behavioral1
Sample
eb514fa03d2d7cd27487df4ea6023cbdff014dd74973b7c5c56151c71568c7f5.exe
Resource
win7-20241010-en
General
-
Target
eb514fa03d2d7cd27487df4ea6023cbdff014dd74973b7c5c56151c71568c7f5.exe
-
Size
236KB
-
MD5
416d5e9361ebbed0f03ba6a159e1fe9d
-
SHA1
3d3896c78ddfe60491ae20ac0f9118d319ad6c9e
-
SHA256
eb514fa03d2d7cd27487df4ea6023cbdff014dd74973b7c5c56151c71568c7f5
-
SHA512
12d34ae5f57bce4ed53fc1b73307593dcbcf7bbcfc70dc1bc109d671779b234fb73b1721f35d6e2e18ae17ac1f8f22c4ebf7cb41020648e64f03b07b3a536a06
-
SSDEEP
3072:bJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/q/FnncroP9:dwDeM7iNEkgiOb31k1EC8J/F
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/524-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/524-1-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0016000000005587-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb514fa03d2d7cd27487df4ea6023cbdff014dd74973b7c5c56151c71568c7f5.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD537b0752b91eaf396c755326b28c06d2e
SHA11992c9b8c4bee3cb6a629c13c4c786778c0633e2
SHA2564d7c20e20228108a06fd9220ad0bf0abf629be85b4b6486db57f5e56132b34ce
SHA512687867c5c2680a330905d8e0ec0b138b2fc5c35bc0fda95228cf7b723d6f1044ffa4ea95855395ca3acaf24eb9f9259a41995c9124ca0f05cc6f9631d41b69fe