Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:04
Behavioral task
behavioral1
Sample
53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edbN.exe
Resource
win7-20240903-en
General
-
Target
53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edbN.exe
-
Size
83KB
-
MD5
92a142cc071194188a72e48a925022a0
-
SHA1
8738c079b107c73d9140fb9a07c46aa25aa40773
-
SHA256
53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edb
-
SHA512
24823ab3b48357b50d4d4e741d076272d29948636dcc2aedb3c52211e73b62c1ca399227210e7b2e66f99bb6f71346397a3a15386af3b59e051453e736894634
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+fK8:LJ0TAz6Mte4A+aaZx8EnCGVuft
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2548-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2548-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53e475450c1fc948d289210572cd8253c9a5cd95b2e2c3bc6ea5452e64976edbN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5ccea1d6e636f9a73fb8501992a588fd8
SHA1960febacfa007586c394ae9e9526e18ffd958f3d
SHA256f42f46eaaa1b619b84eac1c414c09dde21005b7604299c5206ff06ece29f6861
SHA512a30053a3f1ab3bc9c60abe1aa7860cbf1a99c2e22af8690bb32409970276778c1f4804c2dc2e88358a5e8d478ed2cdf45eb2c61b5156d439a5d8249c63852e4f