Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 04:24
Behavioral task
behavioral1
Sample
234e2dd3b538339ba38d8c6546135090N.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
120 seconds
General
-
Target
234e2dd3b538339ba38d8c6546135090N.exe
-
Size
1.3MB
-
MD5
234e2dd3b538339ba38d8c6546135090
-
SHA1
9221ed28b98c919149ad61fffd35f7d0b7cb2a4d
-
SHA256
7e481c9392f8363d25a7ae10adb4dbc61e893e0f19c5194f19d57f5822b84c78
-
SHA512
45e426ba6f628932ae1ec682d335d85cb2c370aae97a2d744cc9ab56fc497e0fc2afe7ba0e888698f8084429b68a9fb97ad74d8661f0b9c26bc5e587a80c5304
-
SSDEEP
1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZCja0tnmmjfFjfPj6ja0tnmmjfFjfPA:fnyiQSo7Z7JpVqTL5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4992-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4992-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 234e2dd3b538339ba38d8c6546135090N.exe