Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:34
Behavioral task
behavioral1
Sample
d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe
Resource
win10v2004-20241007-en
General
-
Target
d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe
-
Size
164KB
-
MD5
ca848fccfa9bada6762f61268b1f1176
-
SHA1
10dcb76ccf592e58d30bb62a42aaaeb129d67df9
-
SHA256
d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f
-
SHA512
285a77b449df15fd471885062aaf51c59fa5e5f8d02ee661b71d012718e6bc94cf3c02e9cd150faf4025f659cc7c076b9ddfd96755032b0b2b7fb66ca98f3fd2
-
SSDEEP
3072:oypMJ2HH5NkKD9Mz1U40Q/RGtabCO7ezYzu3fJXNJlDG:oh25BhMzyFMRGtabPezxpD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4032 d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe 4032 d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe"C:\Users\Admin\AppData\Local\Temp\d60e2aee80acf6346482afc2ca5f6cd7f05f4b267c601c66ba56dc9499cf170f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4032