Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
22e024e6a5739ea198ded32ded7395b0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
22e024e6a5739ea198ded32ded7395b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
22e024e6a5739ea198ded32ded7395b0N.exe
-
Size
155KB
-
MD5
22e024e6a5739ea198ded32ded7395b0
-
SHA1
ba2552b29200ab333fc0b5306e066fddd9f6d999
-
SHA256
194176ab7f1b5110cdfdd64a3834355bc3921fc61cd587448a9c44e65565e22d
-
SHA512
129823e4b4e9ccb4432a2bbd117ad32371d008912eb6162e14504b5ab775739f7e132617adc7cf983aceb8075e02b4d77e62d95cebc2ff14518a490e6bf332ca
-
SSDEEP
3072:bxZVX4/awxfodLJUBv9Bsor1rHjhMU9npQQpmuG:bRARoYlld9n2Qpmx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e024e6a5739ea198ded32ded7395b0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 22e024e6a5739ea198ded32ded7395b0N.exe