Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 09:03
Behavioral task
behavioral1
Sample
00bdd0dbb4f31aa1d8a848853064325c9d196aa9e8bcb1488eaee37d8e604ff6N.exe
Resource
win7-20240903-en
General
-
Target
00bdd0dbb4f31aa1d8a848853064325c9d196aa9e8bcb1488eaee37d8e604ff6N.exe
-
Size
83KB
-
MD5
e962fffb66579103395623dffa9412c0
-
SHA1
a72ce8d433cabe16c35e4e5a7288aa4abecd22be
-
SHA256
00bdd0dbb4f31aa1d8a848853064325c9d196aa9e8bcb1488eaee37d8e604ff6
-
SHA512
47647692d7bd2a4eca2b5158dd49c226c47c141e98da243ecb84f873b8e6f863fee11cbc992d5bb59e1c4b035676564de1a3115eea28db0e4cbf3e319384a1a6
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+wKK:LJ0TAz6Mte4A+aaZx8EnCGVuw1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1744-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1744-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1744-7-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-IlYxUJWc8gPOqj5S.exe upx behavioral1/memory/1744-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1744-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
00bdd0dbb4f31aa1d8a848853064325c9d196aa9e8bcb1488eaee37d8e604ff6N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00bdd0dbb4f31aa1d8a848853064325c9d196aa9e8bcb1488eaee37d8e604ff6N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5494a2a04227b8539dd08193497467479
SHA1b436d06dbced3b499fdff4fc96433404f8c18e82
SHA256121a5011a3e0251dded705ed1ddfb51330ffb5c6bcdf27c89261fa0a46db097b
SHA5122c8927d8200ce097ccda7880ac2c11a55fe4f11cacdccd2f08b65d81dd6504a812a7b764b2c8ffa8aff2c89bdb9da0121bb70ba676e695b6d69b3b9b0a730f3c