Analysis
-
max time kernel
110s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
f071cd358456002559337dfad52d8310N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f071cd358456002559337dfad52d8310N.exe
Resource
win10v2004-20240802-en
General
-
Target
f071cd358456002559337dfad52d8310N.exe
-
Size
1.0MB
-
MD5
f071cd358456002559337dfad52d8310
-
SHA1
0307d100aa8a9f5d1ba2920b12652fcec141e504
-
SHA256
b261156d08b2dd32606f3edc8e0332bb13f0ccf84f19a22511e0dda87f97bcea
-
SHA512
4bd56128c060c7524b23da4961312538dbb817a072b73e883c7c195d4d115b249482c57112389eb674097f1c1a583d94757d6b79a14044cf55013babf80d692f
-
SSDEEP
24576:wQ1OIyYqCfVk4Ym/jTnGDcZELIveNN4wgarv84IA79unD0r:wQ1Q6y4YmrVeNSurv84IA79unD6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f071cd358456002559337dfad52d8310N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 824 f071cd358456002559337dfad52d8310N.exe