Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
7f0a35ca554f145e54e2ac48a26f28c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7f0a35ca554f145e54e2ac48a26f28c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7f0a35ca554f145e54e2ac48a26f28c0N.exe
-
Size
4.7MB
-
MD5
7f0a35ca554f145e54e2ac48a26f28c0
-
SHA1
3d4a79b126a0b3a7c6bc811078c86731d9afcfe3
-
SHA256
1407d984e69539fc933d1985b72aa77a808ef8b8b80453f1296249083817f265
-
SHA512
d3e476242542885da1cc54633eff5858e61a2acc8ba1ed9583712bb0f8f7ccd8dc7358d892c1194a674c0bca6fbc8120254e1072adfc192bf13b906305aa6040
-
SSDEEP
98304:PkLiUV9YElhCjyydBdFtQSTZKG6WhazgOjdRoCRSWb:1UV9rOmrcvKRSO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f0a35ca554f145e54e2ac48a26f28c0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 7f0a35ca554f145e54e2ac48a26f28c0N.exe 1712 7f0a35ca554f145e54e2ac48a26f28c0N.exe