Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:50
Behavioral task
behavioral1
Sample
2512-3-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2512-3-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2512-3-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
0f7e4a60d98741130f521f5d5354082b
-
SHA1
f9d7ef5e9c0e81a9ddf9ebbd17d5aea3ffde0dbe
-
SHA256
89fc74cc48f5da6e0b3e6eb799d9caf77c9ea63571a38c5b99a9932b61bb903d
-
SHA512
b16651804d526c9de3d96ebaea14f90b722dd1d98a8cdf887860e744edb90a14854a20d1365e2b18898f2b5fa833b5c19a48184a0261582e8b29f01dcad54679
-
SSDEEP
3072:Iu0UMFM+T6MDWipeyRdFqFtgwKayHH+xHgHt0WCDr9WCTqfiJE:hTLyRdE9KayHHoHgH2zDrXTc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2512-3-0x0000000000400000-0x000000000042F000-memory.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2512-3-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2512-3-0x0000000000400000-0x000000000042F000-memory.exepid Process 4724 2512-3-0x0000000000400000-0x000000000042F000-memory.exe 4724 2512-3-0x0000000000400000-0x000000000042F000-memory.exe