Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 03:59
Behavioral task
behavioral1
Sample
5cefa12377b6ce10e606466f36bb0377f82068e41777d8d0911444762e029b2fN.exe
Resource
win7-20240708-en
2 signatures
120 seconds
General
-
Target
5cefa12377b6ce10e606466f36bb0377f82068e41777d8d0911444762e029b2fN.exe
-
Size
147KB
-
MD5
aba55708a0a526ed431ed6010b644220
-
SHA1
e8b70e4ad6e5a0199b4f02055706859566781dd3
-
SHA256
5cefa12377b6ce10e606466f36bb0377f82068e41777d8d0911444762e029b2f
-
SHA512
f77b065cad6207b1efb0df66f5a6f70aa317561372dbf9fde51fe9469d740c2e1abf82de4e8e9c6e99accb068cf90c1193a2ef2867a881239516c1b33799276c
-
SSDEEP
1536:a7ZyqaFAxTWbJJ7TG4pWHlPEXZzjUq3th5f6utM5vLNinVmWvMu0b2UdpXk+p0RK:enay25WHIjN3tj6qnv0b2UrXkbvLk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3632-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3632-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cefa12377b6ce10e606466f36bb0377f82068e41777d8d0911444762e029b2fN.exe