Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:30
Behavioral task
behavioral1
Sample
9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe
Resource
win10v2004-20241007-en
General
-
Target
9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe
-
Size
164KB
-
MD5
a8b5df49af78623d3292bf792d3827f3
-
SHA1
a9e59f72dd075d6706a9deaf9225f77d524bbd0f
-
SHA256
9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5
-
SHA512
2c1207b89da3cd209326808414e31a20a60542eab1a8cb613b55976e77623ad084dc5fe1005db65b9eb312a8322e4c7d8a6184e9c3b2cc0df256d34db9efb390
-
SSDEEP
3072:rFJ7Ljw4SBF3VTWM25tNkutVSkJB3r34VTrxaVm4c4B5g:rDonKM2j6utQkJBIrz4B5g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe 3016 9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe"C:\Users\Admin\AppData\Local\Temp\9bc501537fd79ff835704744c4d7567f95c181a1a7933fb1306324c606ec85d5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016