Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 02:34
Behavioral task
behavioral1
Sample
c62efc621f8eecdcdd44e6305bc242df7faaacdd12058d88d6e7f86ec8e7cc58.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
General
-
Target
c62efc621f8eecdcdd44e6305bc242df7faaacdd12058d88d6e7f86ec8e7cc58.exe
-
Size
80KB
-
MD5
116fe3e5dfc2ead80d2ad159a4f425c8
-
SHA1
d6e693d2600028f72bb363ce22ab0ba369c96717
-
SHA256
c62efc621f8eecdcdd44e6305bc242df7faaacdd12058d88d6e7f86ec8e7cc58
-
SHA512
3e383cd627c1f568e300f013475172612490307cb03cee397b50691b37cf1d811336f9f325df7a6c8c3d9bc26800c00a34eac8764951f2ab8a3ec815fc098b87
-
SSDEEP
768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9TazPI0GUN2scvKRttrXv:V7Zf/FAxTWoJJ7TyVGgEvKRzNC5We2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/532-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/532-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c62efc621f8eecdcdd44e6305bc242df7faaacdd12058d88d6e7f86ec8e7cc58.exe