Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 13:24
Behavioral task
behavioral1
Sample
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe
Resource
win10v2004-20241007-en
General
-
Target
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe
-
Size
14KB
-
MD5
4e2eefba72e74b912f088109cb11c75d
-
SHA1
9fb908ff7d3009677e43f890f93ae2d10e75bc04
-
SHA256
5b0441fbb03237c5c83f302dc8e58e451b5e6ff9476ffb57102069161d391a8e
-
SHA512
0330d57f775492a23e3298f0c2cdb97d2f5dc1b4877f194fa47bdc69c8d0df8a02016af3377b88616cb0f7017ed0cd57b70dcfc7698cf913e48344d7f618f3df
-
SSDEEP
192:Y+8C+EKS0O9ejYTDG8bcp4LlnGnieXubWyD9JEBkGxVX4qoNxRJc:YNVjYTDG8gp2leXTyD3EnxHoNW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe"C:\Users\Admin\AppData\Local\Temp\1730208185981162f0ff5b68b4d0ac7ca5d90fc05eb58d07e41b2c2b83b4b4bff49be540b5107.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4372