Analysis
-
max time kernel
134s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 06:21
Behavioral task
behavioral1
Sample
e49bfcbb5acebed0b933b3a664cbf16d9bf01c9b07b6b7fb6b84c03c4319a2b7.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
General
-
Target
e49bfcbb5acebed0b933b3a664cbf16d9bf01c9b07b6b7fb6b84c03c4319a2b7.exe
-
Size
19KB
-
MD5
7c76784558b48b82d0d59a3a366bce22
-
SHA1
657d7dfefc8b3a6c8a205ad81c35ec835dc77b4f
-
SHA256
e49bfcbb5acebed0b933b3a664cbf16d9bf01c9b07b6b7fb6b84c03c4319a2b7
-
SHA512
fb3c621cf6d3c6a92d3420e819264b1254c40f8c8e37db1bfc8875b24f5b50e0c3813a6a5761fd30090256ecf6d82223bdc619126a50dddb39aba14590fec0dc
-
SSDEEP
384:Iuhw2vj7g0Eb9Vp0KuekPI/xjtvSywYqaNJawcudoD7U1PEPmPgP5Kt9:3N7M0E58KQP4kyPnbcuyD7U1PEPmPgPq
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3452-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3452-1-0x0000000000400000-0x000000000040C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e49bfcbb5acebed0b933b3a664cbf16d9bf01c9b07b6b7fb6b84c03c4319a2b7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e49bfcbb5acebed0b933b3a664cbf16d9bf01c9b07b6b7fb6b84c03c4319a2b7.exe