Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe
Resource
win10v2004-20240802-en
General
-
Target
904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe
-
Size
21KB
-
MD5
c65bc629939d9ee10fb30474d1e78dd0
-
SHA1
a794d38cddaf5104e20d220000bf9549e02e6488
-
SHA256
904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4
-
SHA512
ed88a5f3587d27a22f22794b5fb659cbbafe6a13605fcb0e61c5eb9783884f6c48c68db17a9334f9f5800db4022d4977e75a3742403945abe7ad85a861e33457
-
SSDEEP
384:bx02c+NiNMhaS9MySYitL93lppji83C8ARDr3QfTQkNEExIstAv3ATefCiigrcLR:62XiNCR9MLYWi8JsOOstAv3ATec460tq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe 404 904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe"C:\Users\Admin\AppData\Local\Temp\904aa8800f46cd913128ee85587923e31fe22ec1d2bfda65a06f6549779112b4N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:404