Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 21:20
Behavioral task
behavioral1
Sample
46959f5da9957c75750dde63ea65fb42cabf67646ac606515e88b71e7c206337.exe
Resource
win7-20240903-en
General
-
Target
46959f5da9957c75750dde63ea65fb42cabf67646ac606515e88b71e7c206337.exe
-
Size
91KB
-
MD5
848fd967b31cac2261b4588f91d828a5
-
SHA1
16ef5686685b2f599ed36f4b03077c57f7659da6
-
SHA256
46959f5da9957c75750dde63ea65fb42cabf67646ac606515e88b71e7c206337
-
SHA512
150f005d0ddbe3bfb6e5964496be062bfbf9f8d8ea4b222d64f3ac6b7401455cda3e2bbe670acc1358b625e3cb084a6f90e2b63d37709af4bc3f9de7b337ff3b
-
SSDEEP
1536:5sYs/xDwUEA1PjqOILXMPOxqjQ+P04wsmJC:5s5xDyoLSTMHr85C
Malware Config
Signatures
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/memory/3236-1-0x0000000000400000-0x0000000000428000-memory.dmp Nirsoft -
Processes:
resource yara_rule behavioral2/memory/3236-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3236-1-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
46959f5da9957c75750dde63ea65fb42cabf67646ac606515e88b71e7c206337.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46959f5da9957c75750dde63ea65fb42cabf67646ac606515e88b71e7c206337.exe