Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Behavioral task
behavioral1
Sample
34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe
Resource
win10v2004-20241007-en
General
-
Target
34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe
-
Size
164KB
-
MD5
7541d55e74a95833e5a77308cf0a4c87
-
SHA1
38b33fd201be864c24a0f47b3203736d12a1d95d
-
SHA256
34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1
-
SHA512
8c9430042b85afd24780e67c219a3f340bea6a8cb263c62f8ccd191ddb642c1fc58e5ec5f4c8071d7b03fa85fe271ebb629619cbc7abd71e318b6fdca792e2ae
-
SSDEEP
3072:vJGdk2M0igsK8McSzWlv79m0LN/OXd2Ofqcc5TJMHk:EXOnMc2av79m0LN8dTfqc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5048 34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe 5048 34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe"C:\Users\Admin\AppData\Local\Temp\34bcf85a822dafdd97806718e7efb9fee31751579f2777c9d9fb8ade79f11bb1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5048