Analysis
-
max time kernel
100s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:47
Behavioral task
behavioral1
Sample
2156-13-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2156-13-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2156-13-0x0000000000400000-0x000000000042F000-memory.exe
-
Size
188KB
-
MD5
18c116bb01bd58156b6db3be7914cca3
-
SHA1
1af26fb344196d2b23b03b9296a45e441421285e
-
SHA256
771d0f86f53d42a76f4059640786489ffb783b947c2de06ab6e33ef5f33c6e47
-
SHA512
ab83e77597ed355bec6fe54b42ecf70c0f4a495c75f58949f1f9a323393b58c03bf443dd5122c13ab2a2f834e08e3104853c4b3d71c5bb9fca48e82797d4bbe4
-
SSDEEP
3072:+AoYFtUdD5bU0+ML+vbE/n3ECKVAqkcNouqamhIHdFhXdOPzW2MBsluE7w3:PZjK+vA/3DKVAqki/qaPdFhtL2YXGw3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2156-13-0x0000000000400000-0x000000000042F000-memory.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2156-13-0x0000000000400000-0x000000000042F000-memory.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2156-13-0x0000000000400000-0x000000000042F000-memory.exepid Process 5092 2156-13-0x0000000000400000-0x000000000042F000-memory.exe 5092 2156-13-0x0000000000400000-0x000000000042F000-memory.exe