Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 10:51
Behavioral task
behavioral1
Sample
e066b70333e35643353ecf0d3597c21c978f49119845a7ef37d24b48ac49cc56.exe
Resource
win7-20240903-en
windows7-x64
1 signatures
150 seconds
General
-
Target
e066b70333e35643353ecf0d3597c21c978f49119845a7ef37d24b48ac49cc56.exe
-
Size
4.0MB
-
MD5
6dfd5c89ada43ce33783dfa6255b6e15
-
SHA1
c69677aa5166e46a86ed7c03e38a2c009ffb3baa
-
SHA256
e066b70333e35643353ecf0d3597c21c978f49119845a7ef37d24b48ac49cc56
-
SHA512
7b4a2cde29e3c7a612f5e89e5cdee4fece0d70ed4daab500182780ae614aa32bab1eace565e1c4dd1e1acba046bef7996dcad265c0e909366331f64f9072b03a
-
SSDEEP
98304:SomRTpoQB4MBuySrBqf4Y99ca17ZHDjmP38k/Uo1WOy:GRBJuygY9KItGPskD1WOy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2404-0-0x0000000000400000-0x0000000000F25000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e066b70333e35643353ecf0d3597c21c978f49119845a7ef37d24b48ac49cc56.exe