Analysis
-
max time kernel
101s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 20:51
Behavioral task
behavioral1
Sample
f74c85c25c4ed7e8e881e1177a764390N.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
120 seconds
General
-
Target
f74c85c25c4ed7e8e881e1177a764390N.exe
-
Size
135KB
-
MD5
f74c85c25c4ed7e8e881e1177a764390
-
SHA1
fe8f36bdc3dfee3c4859b36e333413172fa58b15
-
SHA256
01e2e91dca698f152fb084103a664717a9d489942c9bb0142b09c7396b81828b
-
SHA512
be742ab7b7d5446d96bc406d1e9d7dea1cd2681838852aa6acf2e64131ad43eb45a93ee12ea35d43477047c6ec1fb1e42d366c4b1cb2e6c18027ef58e2dfb2cd
-
SSDEEP
1536:CTWn1++PJHJXA/OH5Inl3nljSjaYavUgJt8ynjorj9SvzpNzCbq9a1DY:KZ1hPvUgHz7zj
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1432-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1432-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f74c85c25c4ed7e8e881e1177a764390N.exe