Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:28
Behavioral task
behavioral1
Sample
ae06a58792c9824de36b06544f7bd8931fdf20478924c463afeab71a725b3ddf.exe
Resource
win7-20241010-en
General
-
Target
ae06a58792c9824de36b06544f7bd8931fdf20478924c463afeab71a725b3ddf.exe
-
Size
83KB
-
MD5
16ea81ff9428259ba45acd3e27428522
-
SHA1
f7ab9df2f2ff393a5c66b338c91b2da9c35d26a7
-
SHA256
ae06a58792c9824de36b06544f7bd8931fdf20478924c463afeab71a725b3ddf
-
SHA512
21e178fe089460129b6ea80fa12cf45fe4b5b15ee4ef61c5f6c421eef8fa2fbf9474c110ce0f9d7ac967b09c91e90fb973f1c1d848abc4420a16674300e215ea
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+xmKK:LJ0TAz6Mte4A+aaZx8EnCGVuk1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1852-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1852-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1852-5-0x0000000000400000-0x000000000042A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\rifaien2-13ehaBNjldg0bnjy.exe upx behavioral1/memory/1852-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1852-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ae06a58792c9824de36b06544f7bd8931fdf20478924c463afeab71a725b3ddf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae06a58792c9824de36b06544f7bd8931fdf20478924c463afeab71a725b3ddf.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5b493fe4357b1dace0fb121a5d8fb68c7
SHA17f0e34ca9dd5687873ec54d101e3e9bac834338b
SHA256565a1889b77013dfac028b5c5891dad16cef69bf6b6c30d79c54edb6446725ad
SHA512176ec0aedf61ef764ff552ab07dadf36e7d4717566f1fccf346296a993a651d3ef9409ed8e92d8ea376d431c0035c8571a84662257b7f5d5fc0a7a3d32d5ccdd