Analysis
-
max time kernel
140s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 15:43
Behavioral task
behavioral1
Sample
540-13-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
540-13-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
540-13-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
33ca1168948b03b6bda6b6ec625af54d
-
SHA1
cea0446e5c8928f3d8bdd619efe490c44ccaf652
-
SHA256
a9098872292bef64363b4e37fb3b5e7a0138aab55393573981208639bb5a9fe5
-
SHA512
a967142b1ba895aa08f7b84305c40441327a1c1a5bd9432ceec041e18bdf148f871ddf9e042d8d09599918a181792ebacfcb8a80def810e66d1241fdcc196880
-
SSDEEP
3072:1GtjitFrXnIuvfszkr2E62ltUbmqppF2Ws0kiSeXTsSbBZ55RgSANc9vEmKHZqJu:/vI/4762L1qppF2/0rwSbBZ/CS4cZuIJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 540-13-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 540-13-0x0000000000400000-0x000000000042F000-memory.exe 2840 540-13-0x0000000000400000-0x000000000042F000-memory.exe