Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 06:57
Behavioral task
behavioral1
Sample
3000-3-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3000-3-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3000-3-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
a3fd7c1233deeaa054ed7e40be903f19
-
SHA1
aee22effe77702fd6c6ccb82f7709aab935613bb
-
SHA256
f7e96be2b5fafb7b34848173daae869c1e16c2aa75175e0842fa4751a4b9bb4a
-
SHA512
2560d9a1b6581ce0bf9c422f9ab120c34864cbe99b5fdbadc42cd41e43534ac01a3a5f500832f16a4b338ce0d6e26db6397e774680a41f9185a35863fd9acfcf
-
SSDEEP
3072:jnmWFrqmNYQGdCwVTBRVfalJH6sjp1rlPWereEJRFKz91y487B3xP:CNm+fTBfq6sjp1r9Wer9eHZ87BhP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3000-3-0x0000000000400000-0x000000000042F000-memory.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3000-3-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3000-3-0x0000000000400000-0x000000000042F000-memory.exepid Process 1676 3000-3-0x0000000000400000-0x000000000042F000-memory.exe 1676 3000-3-0x0000000000400000-0x000000000042F000-memory.exe