Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
regjump.exe
Resource
win7-20240903-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
regjump.exe
Resource
win10v2004-20240802-en
1 signatures
150 seconds
General
-
Target
regjump.exe
-
Size
357KB
-
MD5
0754f552bf43d0ea03e7ffae3764f76c
-
SHA1
003a0cee6fdcdba86ccd2241213d827f462fcb7c
-
SHA256
d9b8b767e7dd8253d4eb6883ed168f0c6ac89a7ea589a67d9fad1d04fb9acbab
-
SHA512
3901126a6c8826df816d76c37759c8a09b46bfd54a31abb3f1e55396aeae6f21e5afb78da9520dfeb2d63099269e7c7258288862fbde5a8a16b08e5a55e23d88
-
SSDEEP
6144:oigd1dYQq5gnEioa1S1yEs7U79Q4s/TBsB5/uXzkeIcNdrJ7W:qd1dYQq5gnEiz1S1yEs7U79BuXzQ4RJy
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regjump.exe