Analysis
-
max time kernel
134s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
612e077979d300cf07a9b725eb38be21ce0bf772e9c3ca8812a6971ece45c07b.exe
Resource
win10v2004-20240802-en
General
-
Target
612e077979d300cf07a9b725eb38be21ce0bf772e9c3ca8812a6971ece45c07b.exe
-
Size
164KB
-
MD5
4ce96096ccbda0661b401db44bc42b91
-
SHA1
bff68979c21e28eedfb79f5e4323c04ca162110d
-
SHA256
612e077979d300cf07a9b725eb38be21ce0bf772e9c3ca8812a6971ece45c07b
-
SHA512
c30b196b623dba508aea446bf00ba8f82c79dece0e81448a0a0da229b34745c068137b65971e5d9406a258d403ccac987a70731733fb78ed4095f32ff5a3a8d2
-
SSDEEP
3072:+9HL8B1EOUWEsizz9HL8B1EOUWEsizqD9HL8B1EOUWEsizs9HL8B1EOUWEsiz:+lGbiVzzlGbiVzilGbiVzslGbiVz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 612e077979d300cf07a9b725eb38be21ce0bf772e9c3ca8812a6971ece45c07b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\612e077979d300cf07a9b725eb38be21ce0bf772e9c3ca8812a6971ece45c07b.exe"C:\Users\Admin\AppData\Local\Temp\612e077979d300cf07a9b725eb38be21ce0bf772e9c3ca8812a6971ece45c07b.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4476
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4216