Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 07:34
Behavioral task
behavioral1
Sample
f30cda6e2dddd86e17f08c14ff8af6679eb07f8856a6caea74833e3e5e862430N.exe
Resource
win7-20240729-en
General
-
Target
f30cda6e2dddd86e17f08c14ff8af6679eb07f8856a6caea74833e3e5e862430N.exe
-
Size
83KB
-
MD5
aadf9703bfd9dbae169129272dafa970
-
SHA1
68b399eaa7555b82702479830df856070964eed6
-
SHA256
f30cda6e2dddd86e17f08c14ff8af6679eb07f8856a6caea74833e3e5e862430
-
SHA512
02d79a20a6026ade1db25e2b0e6a220baa92a04c6ed1a2254b85f3b187cceadcf01bf47af1e7cfd1c6ea02bbcf1b74cfcb312c0fa7bb71926a6766e4b3c9be61
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OK:LJ0TAz6Mte4A+aaZx8EnCGVuO
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2096-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2096-6-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-FZSZxfG0vVwnUp6m.exe upx behavioral1/memory/2096-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2096-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f30cda6e2dddd86e17f08c14ff8af6679eb07f8856a6caea74833e3e5e862430N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f30cda6e2dddd86e17f08c14ff8af6679eb07f8856a6caea74833e3e5e862430N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cd6ca0b01fcf07f42c9e215ecd3996da
SHA1f471eca42971c32a0a772d788a44948cc871c957
SHA256edf5b1035684e477ac98d86a6c5f901787eb650fa6e721a35ecfc9a7c2cb8776
SHA51207bcc02bfa7d7760b49d5a0f59beaa064907c9fe8c6b6d4cf8094da2ab3ce654475bc4f04e9c7b09bba94e180fb1ff65dc3e62896aca27ddd34203ea21158b24