Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 23:27
Behavioral task
behavioral1
Sample
6f92b82288cd6b2158e0652bb6801a0045fbd8aaa9f33f6f543dbe11ba62ed08.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
General
-
Target
6f92b82288cd6b2158e0652bb6801a0045fbd8aaa9f33f6f543dbe11ba62ed08.exe
-
Size
171KB
-
MD5
13dcc2b64c27d7eb7c75ad11e6ffcdfe
-
SHA1
3d6de410e78e6c673598c328a329d413fa50f2f9
-
SHA256
6f92b82288cd6b2158e0652bb6801a0045fbd8aaa9f33f6f543dbe11ba62ed08
-
SHA512
c470cf774d5ec0120b77d45073c29e7f4e393e3f8d17c6c600392f227eef36321512cbf95c31040d31e169fd30c92bdf2802cdee3d9356f62d6c858a66acf374
-
SSDEEP
1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuXsJtLJtb+PY3hx+fsio5UxKzWZ64+A8J:enaym3AIuZAIuXVVEio5Ua4Ni
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1700-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1700-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f92b82288cd6b2158e0652bb6801a0045fbd8aaa9f33f6f543dbe11ba62ed08.exe