Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 09:12
Behavioral task
behavioral1
Sample
1796-14-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1796-14-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1796-14-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
b59c029ad2e1aeff94480fe91cfebee9
-
SHA1
e7fc158f3acc03ac1108be3caf15cd90654e002e
-
SHA256
bbb3bf1deaef06ebae9bf68b949c63002b3c9c8f1f4693d8950daaee842c8928
-
SHA512
638619dac5f4b4f788590ad6f4a6f792b1aa06e0ebc5a112b7a75c7201c5273e0aaaedaf63816c0ad3428b424e58db12089eee3afccb0ad75cee4e7b2597430f
-
SSDEEP
3072:o/9sQc1gHuINe4Uq5p+Fnnx4q4guKBdLCrAfmw/RBCteAQrh:IDHwmpinaq4tKBdLyomMDFN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1796-14-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1104 1796-14-0x0000000000400000-0x000000000042F000-memory.exe 1104 1796-14-0x0000000000400000-0x000000000042F000-memory.exe