Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 05:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
MeltingScreenEffect.exe
Resource
win10v2004-20240802-en
1 signatures
150 seconds
General
-
Target
MeltingScreenEffect.exe
-
Size
5KB
-
MD5
a176d1cdd73ffefedc75262e203a5179
-
SHA1
c33941963fabab4137ad83c5381f22348c06001f
-
SHA256
88e8c300880131a8fa378f5d0ea13a1bc7e59a9e6f16f8c4a4e924cfba02ab51
-
SHA512
f4d1d6318c8be6eb3a342fbdf9da527d7ae43ab8267974858eed85b97cda3ac382d017e80911148f3ee4520924da1c1427d0badcb4817379cb4eded753cca7ea
-
SSDEEP
96:VUgHwML12T6ViLZ4p9zaoY8xVk8+EudVvLFzNt:mrMLvwZC5aoY8xVk8SNj
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MeltingScreenEffect.exe