Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:52
Behavioral task
behavioral1
Sample
81f6fe3af89592baca9165485cfef740N.exe
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
81f6fe3af89592baca9165485cfef740N.exe
-
Size
736KB
-
MD5
81f6fe3af89592baca9165485cfef740
-
SHA1
8ac1cb93ff37c39847e69143d889bde5829fc092
-
SHA256
5806b58666b2ae9d14172b6a9ed62da5163f948ac1622b4062847b02360b2017
-
SHA512
62cffb314172e48bacfe63bd029e1fe95634300de8ad22a2e53f30a9c248a752e1a1d90c854ed3cc6250380f8b9c208fa7bd9bfe19079848f78f87aab9bdcc65
-
SSDEEP
12288:D2EEoQXJ/8tJV+VUxmSMkqA3C0pF9yapDI0/8:D2EBQZ/SVEcmSMkqA3C0pF9ys8l
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1364-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1364-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81f6fe3af89592baca9165485cfef740N.exe