Analysis
-
max time kernel
101s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 10:22
Behavioral task
behavioral1
Sample
9d8efe64b7c3a2e3efcfaa1135013550N.exe
Resource
win7-20240708-en
2 signatures
120 seconds
General
-
Target
9d8efe64b7c3a2e3efcfaa1135013550N.exe
-
Size
115KB
-
MD5
9d8efe64b7c3a2e3efcfaa1135013550
-
SHA1
7660e5491f59d89fc1b484570ec002858dad31fe
-
SHA256
4a9bc415d3f9d7c85071735f142014f64738f51417012c4ccc2b60233ef3105f
-
SHA512
14950bdf9c73f4a2894ba8675f145244226c45e0c083ef884046d00a2595d412cb0888c3f767c0dbf5925b2099f4f6a13f5347da95b526a31875e6ad547745c2
-
SSDEEP
1536:CTW7JJ7TTQoQbwowwoxTmXadjUSbcDemTPAZk+cLtdNlb9PfESDOayxaJS:hoRMe26W2QZwKS7M
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5028-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/5028-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d8efe64b7c3a2e3efcfaa1135013550N.exe