Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 22:00
Behavioral task
behavioral1
Sample
6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
120 seconds
General
-
Target
6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe
-
Size
692KB
-
MD5
3e47281510cd3b1aae2b63a0ce007a10
-
SHA1
7b1e7d68e4cd6ee20b1255fe916970f1c96f4b80
-
SHA256
6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417
-
SHA512
0d08acde3b37ecaeaf520d3866dc1b82bef020eda4f0494ec596ac8a9aaa0f9f00f2a2d1c35aa3982e109ae197e700980120c7cdc2e522be6de9ade0b550e758
-
SSDEEP
12288:ZFltH22defG0uKJTP75OWmBxR5adSzJOblhEJMngp6j/K4Xb8rqUurVN4yvq+g:ZtXd0pJv5CfCAzOPEJMV/K4XQWU+V7q
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2988-0-0x0000000000400000-0x0000000000562000-memory.dmp vmprotect behavioral2/memory/2988-1-0x0000000000400000-0x0000000000562000-memory.dmp vmprotect behavioral2/memory/2988-2-0x0000000000400000-0x0000000000562000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe 2988 6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe"C:\Users\Admin\AppData\Local\Temp\6c1fd1e8dc7c3f17e398272be599abaa8174da300a7a1ceb699d10b2e06c4417N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2988