Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:07
Behavioral task
behavioral1
Sample
b39d90a928be96c4bcc9f0d17a0c032f53fd5f4b9f4a51db95adf97a548cfca4N.exe
Resource
win7-20240903-en
General
-
Target
b39d90a928be96c4bcc9f0d17a0c032f53fd5f4b9f4a51db95adf97a548cfca4N.exe
-
Size
83KB
-
MD5
a2e6f80676bb3b95ffe7ef98f53f2e20
-
SHA1
3d6b1ec77bf4083e319c8c8eff348eff5d66f160
-
SHA256
b39d90a928be96c4bcc9f0d17a0c032f53fd5f4b9f4a51db95adf97a548cfca4
-
SHA512
faab99d12b1f0063e75109dcb7877d4fe0b3178b3752c7ab79532df234fdc22a40c3740352288a6b516d5077caaa2affbe36936346b275b22e0544fd8845d2b0
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+OKa:LJ0TAz6Mte4A+aaZx8EnCGVuOt
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0008000000012115-11.dat upx behavioral1/memory/3012-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b39d90a928be96c4bcc9f0d17a0c032f53fd5f4b9f4a51db95adf97a548cfca4N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5461aff82cbc1a8cf4c0201b5e843f6a2
SHA180f8c0821ba7a6a95bcaaf4a551ae641ea4707b8
SHA2565f1bfb88962b2157180dae6909fa862ed3d90769fb483c76114d159276ad690a
SHA5126e2e07bde54ad57e27998eb0078a3885af5064a159f3b69ad0c855405e9acb2baa9198f333e4126591d2f2cbdf5f55d08267127366f65288eedbf514ffa30a0e