Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:12
Behavioral task
behavioral1
Sample
c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66bN.exe
Resource
win7-20240903-en
General
-
Target
c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66bN.exe
-
Size
83KB
-
MD5
29b597f36773db708a1d0dddb22d7710
-
SHA1
f103a3e1e228a996fb676f81cc326da7918c8449
-
SHA256
c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66b
-
SHA512
a02db401902f7ea1ad13aa91778d72b99e48c5e6dcda47041852d266404e8cba8b8b283399684441b02a01569d4836582c62199d3ac42f7002b354447bf89197
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+cKq:LJ0TAz6Mte4A+aaZx8EnCGVucl
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2448-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2448-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2448-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0005000000004ed7-11.dat upx behavioral1/memory/2448-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2448-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c00889e2863acac85942d504833f2e9ee1751be234931bf81ebc4f19fd88f66bN.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5eb996318480f73e00cf90bb28661f5bb
SHA1d1463f89a3840c4ce8705381d82399eb684b898f
SHA256642e9707630c2b35c4aa6ac33a8ef95ec2a78779973edbc8f4260be8af6daa5a
SHA512faa71bd37ca51b7acff1297cbdadbb786f0c101885e45d8fccecb9d2c1eede757fea4af9fc7b40f2ca190835a0bc8c1c45bdc7f3fe8a50f8ad29373b85bd810a