Analysis
-
max time kernel
28s -
max time network
37s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-08-2024 01:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win11-20240802-en
1 signatures
150 seconds
General
-
Target
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
-
Size
1.5MB
-
MD5
aba2d86ed17f587eb6d57e6c75f64f05
-
SHA1
aeccba64f4dd19033ac2226b4445faac05c88b76
-
SHA256
807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d
-
SHA512
c3f276820d6b2872c98fa36c7b62f236f9f2650b344a243a30dcda9ca08726f6ce27c5c380b4256a1a7d8d4309e1f2f270f10bad18099a8c9e1835925ea51806
-
SSDEEP
24576:pWKqa4hnzP3w7L3rmZmpk7FSQFW2iJ+N07/TwYV1CdZdQ+4lT+iFgiGTtswAtdz:pSrwf3aZmpOFU2iQNIUc1LxGTtswgd
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ca4397da55b3175aaa1ad2c99981e792f66151.exe"C:\Users\Admin\AppData\Local\Temp\02ca4397da55b3175aaa1ad2c99981e792f66151.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1980
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2424