Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 14:10
Behavioral task
behavioral1
Sample
3060-25-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3060-25-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
3060-25-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
5ef4e8f8c6f6cf825d68059bd9704d8c
-
SHA1
80779e0e6e54fd8e9955a0342655033673a40e15
-
SHA256
9f264811f34972cc690b03a1ca03a6333eab5235cb03991712e368e28633e704
-
SHA512
6dd7e0bba327335e69d7d9b7d7081e1174017a9f74dc5c0c5a6d9210bfb6b9c7d10c080f051c4f067f05abd1ec5c90080c027c4fbf97dd53c85373df0c52a2ad
-
SSDEEP
3072:M+rHFq+87AJF3BEF3P5uRA3va2dmshdF4VTQcbVrsOwhV+nYfd+9:z/SF3RgYa2dms14Vr80
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3060-25-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4212 3060-25-0x0000000000400000-0x000000000042F000-memory.exe 4212 3060-25-0x0000000000400000-0x000000000042F000-memory.exe