Analysis
-
max time kernel
115s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
ba9be2db5441b856e1f27164fb12af60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba9be2db5441b856e1f27164fb12af60N.exe
Resource
win10v2004-20240802-en
General
-
Target
ba9be2db5441b856e1f27164fb12af60N.exe
-
Size
654KB
-
MD5
ba9be2db5441b856e1f27164fb12af60
-
SHA1
2b3493e07777ee07295d905ed4f31d5bba6e4dcf
-
SHA256
63984f8fc408cf6f8276063959ef696310966c0c7649d4ecf6c5c36894636702
-
SHA512
f382f546cb1a45ea46572cec92a7d977990f34d7cea8026dacbb6d7630473ed9771056f7c81d78665bf21243f3e48b72c2b1cccf54d6aa77e1da6a4d07f860fe
-
SSDEEP
3072:8fKPw/6Nb8lAtYpDzo83H6JrgboTlyMvXOqms0itTBf28Vdp:EKP9NCAt8zErgsTlXvXBmJitTBe8VL
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 107.178.223.183 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba9be2db5441b856e1f27164fb12af60N.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe 2096 ba9be2db5441b856e1f27164fb12af60N.exe