Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 21:07
Behavioral task
behavioral1
Sample
74575854943c901d7336630eb6fbe180N.exe
Resource
win7-20240903-en
windows7-x64
1 signatures
120 seconds
General
-
Target
74575854943c901d7336630eb6fbe180N.exe
-
Size
268KB
-
MD5
74575854943c901d7336630eb6fbe180
-
SHA1
312bd849415ab313443ac5a928739f591e5d2e4b
-
SHA256
e992d78f5b0d0097af219dfdcbddef83df50208eee6bce0a46d0471f57a8b4a3
-
SHA512
35c95eb99d30eaca31b5de47e221f7e1d113ccc110a471050e855714cd228ac604237d1b21bdc5e65cf4828892c92936d49346c5426a6f82977ae303726886ee
-
SSDEEP
6144:BmVGLUzbF6QH3S8+b6uyptEIi9u/mv8saZHRD+v4M84Z9YkF/GeHQHyORQdcwKtA:s6QXS8+d8camUsaZHRDa4M3ZzF/GeK29
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/756-0-0x0000000000400000-0x000000000041D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74575854943c901d7336630eb6fbe180N.exe