Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 01:43
Behavioral task
behavioral1
Sample
3b137ab3862d6f7ef47e465325d40ae73345ad093058af1c705f03c480a9a55eN.exe
Resource
win7-20240729-en
2 signatures
120 seconds
General
-
Target
3b137ab3862d6f7ef47e465325d40ae73345ad093058af1c705f03c480a9a55eN.exe
-
Size
165KB
-
MD5
bbfdc007d0c5d74e92d7771002ff2c30
-
SHA1
26c2b85963e74388b06e6f36e66fe395c491e034
-
SHA256
3b137ab3862d6f7ef47e465325d40ae73345ad093058af1c705f03c480a9a55e
-
SHA512
d609b44f95d9c1b290f3e65e32673a49a90470a882acb452fa7cc122fe3e3f8f9be4ae1777f71b85336fd6dec7a922d0f3d9389729e7150f4344e910e4d62af9
-
SSDEEP
1536:V7Zf/FAxTWOOsIZfzc3/Q8zxQiKJAWJAkNjRfEk8NhoYyRvaLNFqRprAqnMEosmM:fnyjQSoXFXw2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3492-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3492-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b137ab3862d6f7ef47e465325d40ae73345ad093058af1c705f03c480a9a55eN.exe