Analysis
-
max time kernel
135s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 17:27
Behavioral task
behavioral1
Sample
2504-10-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2504-10-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2504-10-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
10da4a342fa4cbca044dfa304bb84640
-
SHA1
dc43cfe424ab2080b38ee7099c9b78d2f29de739
-
SHA256
6754b5963bba07e441cf02a860634096688c96e1b2adfed271decc15c37ea277
-
SHA512
d7183daccb0803afaefe864a9b1ddf48c4d1764ac4dc314205d272e8493cde0b5402c2cde44c11300f131f03d8a73d3199a328b6f35e089573269174c13f78ae
-
SSDEEP
3072:fuc69FxST/FBBRWfD83yGvuVrz7Fhbc40cBp3csvZE/94nGN:AM+fDqbWrz7FhvBp3cdFim
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2504-10-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1556 2504-10-0x0000000000400000-0x000000000042F000-memory.exe 1556 2504-10-0x0000000000400000-0x000000000042F000-memory.exe