Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 03:10
Behavioral task
behavioral1
Sample
75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3.exe
Resource
win7-20240903-en
windows7-x64
1 signatures
150 seconds
General
-
Target
75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3.exe
-
Size
54KB
-
MD5
2b1c8def16de259025c3a247184d64b5
-
SHA1
dc70ab54ff985ba552f008221967feb72af7e134
-
SHA256
75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3
-
SHA512
46bf61fc9bda6246e0735d768c5a7c0d99e63af838c0cc823e4f009666aecf3ef52d8795d8c077f65e4823113111820d73db1393d467ab535f9423e9b62b11fc
-
SSDEEP
768:Kw6IXf5KTmkBIPcEx/MOAhak8ED7DvJM+i2Mohng6t4QnPC1YiPW947f:KKfEPI3kZhp8ED/vf9t4IPyj
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4976-0-0x0000000000CD0000-0x0000000000CF0000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75df282554115586077880e7d665950f4517fa8ecb1121ce7d8c76466fc844c3.exe