Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 23:45
Behavioral task
behavioral1
Sample
artifact.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
artifact.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
artifact.exe
-
Size
48KB
-
MD5
d6ed9c74a7a0426c5aa7a1e71297f948
-
SHA1
6ed7c292a367efa3984dca34fcb2a6fdd9a2a5d1
-
SHA256
ddaf2f537d9990939f13561fd0cacecba82ff33bcab81ab14750b143480d758e
-
SHA512
6653636658e6cef070dd981aa5d555213679ad1079a4ca101a4dae1c5bcb2f8c5c4acecdcb89604f581755612771a7b999f20e02318f22b21b90d7bc9839902c
-
SSDEEP
768:ZCwSWJf70j1GEANY56B8Bcw5Mm9VbKIxYhuSgbJeItssFznhtaqNMIfWaArcflJx:kGerYh6NDjmulgmeQGN3fzRZ+Avl
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language artifact.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe 3268 artifact.exe