Analysis
-
max time kernel
92s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 15:42
Behavioral task
behavioral1
Sample
2168-3-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2168-3-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
2168-3-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
75f8bbe4704bfb1f680803c153ba0578
-
SHA1
8ab882459bc57d14c10a3051e5253180b3cbe7b9
-
SHA256
9bd6378f65c2c617a1732285ca7ccef7431a77ac51da93103a57dca695b52e50
-
SHA512
642ac4b4eefb1bcf0877a9050061f27d3af8cafe23797693d32a9b3813380257ac9f4a840876125be8cd76af6187044dec815e6787fa0e0bf0931272f64703e1
-
SSDEEP
3072:aUjt6FNzljuY4k9Ve7Ks0pvN6PDaVPLFRGTOJpRvsAeh8DqemyapP:AFOKsYvNKaVPLFKOJpRvts8VVaB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2168-3-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1228 2168-3-0x0000000000400000-0x000000000042F000-memory.exe 1228 2168-3-0x0000000000400000-0x000000000042F000-memory.exe