Analysis
-
max time kernel
111s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:22
Behavioral task
behavioral1
Sample
cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9N.exe
Resource
win7-20241010-en
General
-
Target
cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9N.exe
-
Size
83KB
-
MD5
085ac6dff1de92ad24494b805bc45590
-
SHA1
2452d65ca73572da62c607c3cebe717a459c598e
-
SHA256
cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9
-
SHA512
86a1c46e725b354b3f6659c300c6b90e48e6bb19c10353b2e9155b50a47172cedb10a2d15d45a4993c69249fe451c0d2a6b1eea43c5546449828fea491cfd472
-
SSDEEP
1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+NK6:LJ0TAz6Mte4A+aaZx8EnCGVuN9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2280-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2280-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2280-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000a000000016cd8-11.dat upx behavioral1/memory/2280-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2280-22-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb5f41c31ec097329945977a580b65b6dedd1442d89623bead13e299b7ac79b9N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5feab6d95ff33155eb5e9d1878c0b86d6
SHA18d7c1f0f0fee24bb06ecf74dcb08b6c3745a1e70
SHA256d0c80c0c21204aa3b4c0530cb40d8aa77ba9102b635288e299f3e51f4b0e4078
SHA5121f6f1ba0d0905d4d99e19570172ce35e7bab22183ede18d8d261aa78083980d6b4415df0edfd3023c4cb026e2f6e8f356f55b85aa2a0e792b5686c383913bcf4