Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 07:02
Behavioral task
behavioral1
Sample
74767ea7dd7c4fc21cf131e0160ed270N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74767ea7dd7c4fc21cf131e0160ed270N.exe
Resource
win10v2004-20240802-en
General
-
Target
74767ea7dd7c4fc21cf131e0160ed270N.exe
-
Size
188KB
-
MD5
74767ea7dd7c4fc21cf131e0160ed270
-
SHA1
892725995e452f28cdfe7f2778da76244d62c8bb
-
SHA256
8489bd56a9600404fd96c0a11290af3a56f5a3cdd77274446d41d678248b4d44
-
SHA512
6e7a27ae6b95ac1922e2336ed63064813380d7d86fb8cea4a075f22e86d87a0b1642f2f3e8b02ba3f99e5625afeaf0660e7f0bc29b2ca23cb0dc599472ee1f5a
-
SSDEEP
3072:9XqcEZpJXbWbBA+xfdpKKa3s9UcqmtaMqE7bNxop0yRJAnfH8d:umyufdla3s9Uhe7Xo6yR6fc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74767ea7dd7c4fc21cf131e0160ed270N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4048 74767ea7dd7c4fc21cf131e0160ed270N.exe 4048 74767ea7dd7c4fc21cf131e0160ed270N.exe