Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 09:01
Behavioral task
behavioral1
Sample
d86876200e52d18eb7d7a28c61a54f9054c24c338757874eadc68e0da839f798N.exe
Resource
win7-20240729-en
General
-
Target
d86876200e52d18eb7d7a28c61a54f9054c24c338757874eadc68e0da839f798N.exe
-
Size
83KB
-
MD5
9530bb9d492b5ead7f657f8c4e1e1e20
-
SHA1
733992d4258533bdccff0b1bcbf37d2548936369
-
SHA256
d86876200e52d18eb7d7a28c61a54f9054c24c338757874eadc68e0da839f798
-
SHA512
c4978979351c0b0fe75286907657a692b1756b21b6def0a6e4e70563a112412f84f3337c88dd9a01186298416fe51bc8697c86ef0bea6e86b66888857e84ab48
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+AKe:LJ0TAz6Mte4A+aaZx8EnCGVuAX
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2640-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-6w18hzgT3s6EO0HF.exe upx behavioral1/memory/2640-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d86876200e52d18eb7d7a28c61a54f9054c24c338757874eadc68e0da839f798N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d86876200e52d18eb7d7a28c61a54f9054c24c338757874eadc68e0da839f798N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD58a89da9dfa72b276883191160589d231
SHA19298bb574c06ff5f8b1b049e7f384dfc86436f58
SHA256938d68eb51b1dbcb8452280d0185d9f7b5598d50f6208d9fbe12b86cbbf81369
SHA512f44001f64bada7034902a053aa324104d29b30a36de471a69b0e7c055e4b4eef07f2d3a0aabdadea3a5fd509c10e14213bb872ce0d8ab4afd6a5b34e16d1e97f