Analysis
-
max time kernel
110s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 09:11
Behavioral task
behavioral1
Sample
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
Resource
win7-20240903-en
General
-
Target
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
-
Size
83KB
-
MD5
b04ccd1757587d7efb5c92fe21e8743f
-
SHA1
53d02057046ac9fd42ad815ac34c874d89d35e82
-
SHA256
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5
-
SHA512
ed44e8e32c267873c58f07c5e5de7eb8adcc6f76208b4552ec1dc7656db457f2108cb09aeb88880d94c35f6837559361e0db279de5d62266a3f76e39aa9281ab
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EKt:LJ0TAz6Mte4A+aaZx8EnCGVuEW
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2148-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2148-5-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-PKfHIbBLSNbbc1dD.exe upx behavioral1/memory/2148-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2148-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 422b1240e412a0eda277587eac3ba5fff8c2072f39cb71d90950ef8dbd7713d5.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5da9a4018f337ab4751a962bf06a90c28
SHA180286bf89c83ad73e2c112875cddccd5e10524cb
SHA25633d39833d3ea950f0a0387f1f457415e0a8cc8050739a10b59e65ea1f1a5a58e
SHA51204768f35f553e93a96b5569bb52c7c29a2f066e8118996233c19b301c7d73f79d4c935bc1a8ab766c37f144a8d92254ae5c8586d9cf540af68587cc989bda5c5