Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 09:14
Behavioral task
behavioral1
Sample
42e1a10b1a78f67c1954af29e3d7558f8ff46f9851541c23c9afaf56ed1f8bd2N.exe
Resource
win7-20241023-en
General
-
Target
42e1a10b1a78f67c1954af29e3d7558f8ff46f9851541c23c9afaf56ed1f8bd2N.exe
-
Size
83KB
-
MD5
a4abc30cbc4e7a95c9d90f537e6cc550
-
SHA1
2b2422aaa4dfaf960278248d7f125e55169d15b9
-
SHA256
42e1a10b1a78f67c1954af29e3d7558f8ff46f9851541c23c9afaf56ed1f8bd2
-
SHA512
2c12b3931aa03af02dfd3138b7fec053237ea5a15bb8e0d36c55dfbe7a8274bd6c2bb1c305101751a94138359e1048bcd99fe6fb1e35e1c5ad3f7e726c33f3d5
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/684-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/684-2-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/684-6-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-OAkLYX5oZxbksAuk.exe upx behavioral1/memory/684-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/684-23-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
42e1a10b1a78f67c1954af29e3d7558f8ff46f9851541c23c9afaf56ed1f8bd2N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42e1a10b1a78f67c1954af29e3d7558f8ff46f9851541c23c9afaf56ed1f8bd2N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD53f46312f68d99cbae3ab8d9d11fdb8a3
SHA1080d994d15a6a55adbde4c6a9a53dd36002fbe58
SHA25658017a00598f26f5fa8e03817efc58f44f93ab95f64d8d9adfefaa9d68b67fb9
SHA512cf3c9bb01b876980ce6986ed00a69bc85703d9d488ec612ee3603cd91d3bc7675ff783b2a7ffab6abe0cf15fb3cbbe040391192417c37ce6b0acaa507b9d5f11