Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 07:26
Behavioral task
behavioral1
Sample
1520-10-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1520-10-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20240730-en
General
-
Target
1520-10-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
7e06331cb1501b4cf06efcd8443f4f46
-
SHA1
226963be1da014f24245c3bb5886abb3a3b50152
-
SHA256
a198051a27500bb9f0f729a5e8712154736d458b6ebea7c4e29d73f580dd3a82
-
SHA512
eaa87813ed95d7cecd810b4fcd0b13590e1a5d1c4e8732a020c46d6c63616a93f258a4ed9fee6f760b87d8398f43f0da1642c9b319de8b57202ad6374fc6345f
-
SSDEEP
3072:qP5EF8K+Iro3Zc64BrajJYv3ZS9o/XwMTNQ2qKBfb:ThmZvKajJYv89UNBQ8B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1520-10-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4172 1520-10-0x0000000000400000-0x000000000042F000-memory.exe 4172 1520-10-0x0000000000400000-0x000000000042F000-memory.exe