Overview
overview
7Static
static
7cvery.comd...de.bat
windows7-x64
1cvery.comd...de.bat
windows10-2004-x64
1cvery.comd...t1.elf
windows7-x64
3cvery.comd...t1.elf
windows10-2004-x64
3cvery.comd...t1.exe
windows7-x64
3cvery.comd...t1.exe
windows10-2004-x64
3cvery.comd...wn.exe
windows7-x64
1cvery.comd...wn.exe
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 21:37
Behavioral task
behavioral1
Sample
cvery.comdel517568090355/CleanCode.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cvery.comdel517568090355/CleanCode.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cvery.comdel517568090355/Project1.elf
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
cvery.comdel517568090355/Project1.elf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
cvery.comdel517568090355/Project1.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cvery.comdel517568090355/Project1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
cvery.comdel517568090355/spawn.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
cvery.comdel517568090355/spawn.exe
Resource
win10v2004-20240802-en
General
-
Target
cvery.comdel517568090355/Project1.exe
-
Size
166KB
-
MD5
6e7165135b0e7db9ae9ef068138693ca
-
SHA1
2555606c52929b506a8fd02ce47adabd9b06ee12
-
SHA256
368e2ca698a57ea071c04f1810cf682025481bff928f9b32e3a848b0bb3f7559
-
SHA512
0442a97f00b59269ce420e5904182326622b233b47f4e6e59ccd433f8b6b317b36b2e336788638e08d1c82b140069a277553c9efe555f6cc369160cfeafc2141
-
SSDEEP
3072:2emFqHjRMqMId+ENQ0NGhr+B7cSZttH7EV4mkqLrXYuDxIrDuXm:HmFqHjlzNGKcSR7JqvYGx6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Project1.exe