Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 12:42
Behavioral task
behavioral1
Sample
2264-22-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2264-22-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2264-22-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
29879d8cca0b9919484c85b6a1113889
-
SHA1
46d4bb771c27a12ac490a2856b06df41fca06510
-
SHA256
63da5d1bf36e1c74cc41db76adfb4c48acb24ac3ccf85e076d4d2cb6f80f0e12
-
SHA512
32c7c9190531f9b4438d819930adb2ca57f6f1f9bf47f012881521e2b8f725f3535b1aae8c4c175489726b485d95f3f519ac1aaa008fbaa7e898e72f28c9e8ff
-
SSDEEP
3072:OywCYFs6M2s8GWUjjg8G3sO/XqF3BE20M3Wx5/50ZcKCP7ZE6oYtqKr:zFKUjjxu/qF3Br0M+5x0ZcKQmjFA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2264-22-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3684 2264-22-0x0000000000400000-0x000000000042F000-memory.exe 3684 2264-22-0x0000000000400000-0x000000000042F000-memory.exe