Analysis
-
max time kernel
115s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 18:09
Behavioral task
behavioral1
Sample
2a07460873d7d2ec97960b592c9ae3a0N.exe
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
2a07460873d7d2ec97960b592c9ae3a0N.exe
-
Size
161KB
-
MD5
2a07460873d7d2ec97960b592c9ae3a0
-
SHA1
0c1bc087326e1d4bbe6fa5985f3919acb146715b
-
SHA256
470aa2a5a40cac9344d6b14ddb818e51896307dbad31ff176f2eae0dda7d0a63
-
SHA512
43631630d62da0a6a221897a040f6fd8c28096e6a51b586144e1e71fde6bdd56ee5d1d46fe3b59f06362ab38c7058a5971dc4f98569aa7d312412ec804247c65
-
SSDEEP
3072:fny1ATcfWVP2ZQfq6Tl7j66sfmTk3WdK10:KrWVWQVm6S3WY0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2104-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2104-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a07460873d7d2ec97960b592c9ae3a0N.exe