Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
General
-
Target
6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652.exe
-
Size
5.4MB
-
MD5
87c9aecd5886c99434358b6a7f42fde0
-
SHA1
a1424fb0f5bb9fb49a8797c4c43a7b8a4511b2cc
-
SHA256
6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652
-
SHA512
10086695bd697a181f694949846178ea195ba3e0b44eed39aa054110448bcdfddd8bce6cfaf1e7d9476d017425e9b6c3ba7c8d6b76bb0597cee2b0294dc9c2c9
-
SSDEEP
98304:B9jwL5kme5BYsmXZp9i/OcQItBftG3w+CdnFs/djCfnqg3mePCCFE:B1aime8L0mI7fpjnFsfahPv
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3004 6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652.exe"C:\Users\Admin\AppData\Local\Temp\6c0274f44ac55e0619f215604d918e9764ab221e08f2432cd08e65ac69d65652.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004