Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 14:08
Static task
static1
1 signatures
1 signatures
150 seconds
4 signatures
150 seconds
General
-
Target
-
Size
781.6MB
-
MD5
30bc106a7a64edbbecabc7ec25a7eeb0
-
SHA1
7d5cdae23d30593cd395d5d83cc234fb128fd7c8
-
SHA256
380900fee200269329d9c0ea97f9ce596a6e3c38d18e74ee2c03b02baae747a8
-
SHA512
b46c9e29691f7f5e107c56168a1408f1d97da27a18e858026ab89a69f42bebbcfe8e2c433f69feb8a6b5ceb7ed3321c831168fedc1c55beb5a62ab0edbf4c395
-
SSDEEP
196608:JUHy0s8us92Lqh/nsXy2BLojRKpYLZC+tVo559fwwrkVtKW2t3D1RSW:x8u02iz2horLZCwa5ZwwrUT2FD1RSW
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- System Location Discovery: System Language Discovery
PID:2420