Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
procdump.exe
Resource
win7-20240903-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
procdump.exe
Resource
win10v2004-20240802-en
1 signatures
150 seconds
General
-
Target
procdump.exe
-
Size
773KB
-
MD5
f2091c44d89789f689d98bc244358878
-
SHA1
db1ef4ce56820c93a3b7f1fdf36d3fffc7d1ec96
-
SHA256
e4ea34a7c2b51982a6c42c6367119f34bec9aeb9a60937836540035583a5b3bc
-
SHA512
95fea3d3e28ac1b67bc7d5996d9af81da31f867bc47c27a0b1a3bed42d2c5347e4746a2a83d435176c6b483a2e387a8fa5fec80bcf745ec5b250ac6d646dfae5
-
SSDEEP
12288:tGrcwkC4P93u+QLNaPmlkje+kjOf1lyJFG:tG8C4F3JQLomlee+kjUia
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language procdump.exe