Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:51
Behavioral task
behavioral1
Sample
abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe
Resource
win10v2004-20241007-en
General
-
Target
abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe
-
Size
164KB
-
MD5
c585ab1ae84ec7d496a0fe8836120c2c
-
SHA1
20236921278fcc952641b0b8de07faf9e389d56e
-
SHA256
abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a
-
SHA512
823f607dc605ce569c68279a16bf6a14ba87d04221d8c3776702ac810586aa5068901158c4769cf0fb5eeeb3e5e050db07cc89d475a6762dd4a2cff819a669eb
-
SSDEEP
3072:LipAqm2/hqXGWfXEMX8SkMxsAtYVGnQOU7zvYmajkpKBbR:LRlHUMX51WAtYVkQOqe6ob
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exepid Process 512 abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe 512 abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe"C:\Users\Admin\AppData\Local\Temp\abfe3b009040e7004c9caa242a2cd4bc8a535ef6b35ed2be7334bb4e6778ad7a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:512