Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 16:35
Behavioral task
behavioral1
Sample
2816-29-0x0000000002AF0000-0x0000000002AFA000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2816-29-0x0000000002AF0000-0x0000000002AFA000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2816-29-0x0000000002AF0000-0x0000000002AFA000-memory.exe
-
Size
40KB
-
MD5
45158a41936e0e2ad90271d4c860470c
-
SHA1
b73b5a6cd70bd7fad3fec9cf228d1aaeb4a02a8b
-
SHA256
2c5737a767c4de110d2a0be2db2b2f71e86107eb0d312525baccbdb63b339861
-
SHA512
f0876428a36ca8f865734b874360d13ec3695594f3d5d87bece592627dab1402eb38859b45d59aa0d72e80d0914af781629dc205d41c813d9531d4661bddeb6c
-
SSDEEP
192:F+8C+EKS0O9ejYTDG8bcp4LlSEenieXubWyD9JEBkGxVXtqoN2RJ0:FNVjYTDG8gpWdeXTyD3EnxOoNd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2816-29-0x0000000002AF0000-0x0000000002AFA000-memory.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 2816-29-0x0000000002AF0000-0x0000000002AFA000-memory.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2816-29-0x0000000002AF0000-0x0000000002AFA000-memory.exe