Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
4657.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4657.exe
Resource
win10v2004-20240802-en
General
-
Target
4657.exe
-
Size
2.8MB
-
MD5
fcbcd993c8aac9958998a8db7bb01ede
-
SHA1
e955111d4f226aa048daec1917ff890690560d9d
-
SHA256
e2370af667a34b551f148ae65249d12ec7e92a4f1f3bb964240620c4e0253972
-
SHA512
47339d48244527e2111fcd279abd60698ab90bc4a7fb99d40ed777d33b74c964aeff2b3721239697f9f7087f52dacd3738df503d9d4fde88755c02cfdd0e6234
-
SSDEEP
24576:Gelo5jh+9b8SL1lAdL5+FPI3YqOcHQSFablTmVfjxquGjHneFUJfKkyMUAdE2buq:fl+h+1qs0Y/BTmGuGjHnevkwAdZaN6OC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4657.exe