Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 03:51
Behavioral task
behavioral1
Sample
45ac60f7c17bc0fa772f371c297af560N.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
120 seconds
General
-
Target
45ac60f7c17bc0fa772f371c297af560N.exe
-
Size
108KB
-
MD5
45ac60f7c17bc0fa772f371c297af560
-
SHA1
7e7b670bfe6ec0dea9fedceb751de5c3c0b474d0
-
SHA256
4b2d507c5a0edf26a2084c9bf92b2ae357fd469a4d5a5e562193262275cca93b
-
SHA512
84909cc302b2088fae4aa228d1d848316299baaa4b9c3b03215771d375defe1dff581186a11da311df2837e09717c9c433bc844d68092f97d439c587c7429b49
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZf2XcqUUgWIVD5IDaGZC09c51+EGgSwCjIc6dP:KQSo7Zf2X9UU7964ExSwDF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1612-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1612-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45ac60f7c17bc0fa772f371c297af560N.exe