Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 04:57
Behavioral task
behavioral1
Sample
d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe
Resource
win7-20241010-en
General
-
Target
d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe
-
Size
740KB
-
MD5
1e7fc89069d371b6adfb35d3f45b0a23
-
SHA1
0deabfc434b3754225ca350187a064f8cb97385f
-
SHA256
d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3
-
SHA512
662c3657a0e1679070bb95e2c5e5aee0db589c0f59bd0d61e1699596adb86b7146e7beb9b6d70cfaac8d76b96beeef555769eadf31a6bc7af99a0c1f4150b387
-
SSDEEP
12288:1z2pOdrPb5PPLYmO4tYoKdicX942bNhob4vELFg5CXbqWPgdhyc8XzXQ92zpBwdi:1z2pOdrj53L9+7As9nbjq4vELu5Ebubs
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4936-0-0x0000000000400000-0x0000000000578000-memory.dmp vmprotect behavioral2/memory/4936-1-0x0000000000400000-0x0000000000578000-memory.dmp vmprotect behavioral2/memory/4936-2-0x0000000000400000-0x0000000000578000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exepid process 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe 4936 d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe"C:\Users\Admin\AppData\Local\Temp\d3e396fd1990c5ba323b2756ac4b2ba657c7d80fcf173c8e39c9e52ae77b80d3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4936