Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:50
Behavioral task
behavioral1
Sample
76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0N.exe
Resource
win7-20241010-en
General
-
Target
76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0N.exe
-
Size
83KB
-
MD5
dc78de567cd828b680aec4816a6726d0
-
SHA1
5e80f215cfecfb844cf080c8170f0fd97a7a00f0
-
SHA256
76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0
-
SHA512
eba1b8c45c5962cb73a3d028e1475ed43612a949fbeb9e3ee0e14255905438b3301e5eebb3fbc4117340491202133f78795e93b933c4154c07f49a9531c1f76e
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UKk:LJ0TAz6Mte4A+aaZx8EnCGVuU/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000b00000001225c-11.dat upx behavioral1/memory/3012-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76b23824ef72ec922032582a9ca760c73152d5bd787ec0332929f7348b245bf0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD583bf0bd6f81bdea2b80751c80a77dda7
SHA114dbc60914184716de8683d0666aa9b1f00428ae
SHA2567274168b6736f0f6453b5fb1171a07863318a56dac785367d92aadc7eec0537e
SHA5126b237ca12200cae03c715cce161502a281bff5cea4c7c427cae633cd6b4c29e7bf6842045ff77983d9bea3ddfd83323f16b7118bbc088aa94b70d833dc85ffeb