Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 00:44
Behavioral task
behavioral1
Sample
31d752d63b74deb51c22e71ad1d0fe30N.exe
Resource
win7-20240729-en
windows7-x64
2 signatures
120 seconds
General
-
Target
31d752d63b74deb51c22e71ad1d0fe30N.exe
-
Size
770KB
-
MD5
31d752d63b74deb51c22e71ad1d0fe30
-
SHA1
b54e514d54a1ad3a1a557e4965c73ccb486adce0
-
SHA256
766ef505109cb436fe1cf3cfa9c91f6a4f224a69c45a489faabd2e622d7d73bb
-
SHA512
6542bea706ae2e260ec356d1082b69cd86cf0dbe213d8ed36947856ed6ae260325bd8a1596b544c6672bb192911946978f17743a542540fcbf1968e30f4821c5
-
SSDEEP
12288:sQtPoQXJ/8tJV+4AmSMkqA3C0pF9yapD40LW:sIwQZ/SV2mSMkqA3C0pF9ysM1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2628-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2628-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31d752d63b74deb51c22e71ad1d0fe30N.exe