Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 00:57
Behavioral task
behavioral1
Sample
2c95dc2d77991e17d51357f1c0fea210N.exe
Resource
win7-20240729-en
windows7-x64
2 signatures
120 seconds
General
-
Target
2c95dc2d77991e17d51357f1c0fea210N.exe
-
Size
36KB
-
MD5
2c95dc2d77991e17d51357f1c0fea210
-
SHA1
e091e8ee0b26fccbef32b37aaf32ad8f9cbbd14b
-
SHA256
2b14a6b3ed961c2dca641ff7f7bad6c9ce2405f6e299f1b1e844f11623a23cad
-
SHA512
da6eddbd39fef58315e906fe8cab59bf54f5247cdb63662369114602dd0b35bf1873236f02974e838edabca01f3cabb9e2b9e0f8a72d9f81694850116ef7176c
-
SSDEEP
768:GmLo5mCBLLwuNWusVYrt/j9io6c/aTJjcl:bLof5wkWurtZlGKl
Malware Config
Extracted
Family
xenorat
C2
localhost
Mutex
testing 123123
Attributes
-
delay
1000
-
install_path
nothingset
-
port
1234
-
startup_name
nothingset
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c95dc2d77991e17d51357f1c0fea210N.exe