Analysis
-
max time kernel
14s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
secret.exe
Resource
win10v2004-20241007-en
1 signatures
150 seconds
General
-
Target
secret.exe
-
Size
914KB
-
MD5
4f8857943e21f91f45eb4e801511ac3a
-
SHA1
9d7ae94eddd6ae5a29cf864096805861ebf990f2
-
SHA256
1c44fdb0b82ebe7ff6e47815c3866a81ac2abed3e7ad6c5b6a076764fd264fec
-
SHA512
e12a5d3274f9493052484433f3a3d73183cba74c0d3cf53613a1a770f6c625401a7cca32155e85a159fa44085e998f3a66158809810f132f803aa2f5870461dd
-
SSDEEP
12288:qOtyE6lm5Q38hylltLBK1hCOXQ7RsgjfGfQOIWD/LQMBUNisxAyB:TyEXQ388BK1tyFDG4OIKkM2N5x
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secret.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\secret.exe"C:\Users\Admin\AppData\Local\Temp\secret.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1548
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SelectStart.xlsx"1⤵PID:440