Analysis
-
max time kernel
92s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:12
Behavioral task
behavioral1
Sample
6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe
Resource
win10v2004-20241007-en
General
-
Target
6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe
-
Size
168KB
-
MD5
a5b9614cb31c2f4c76d2af10740bb83e
-
SHA1
b1696cf367eb7c46e33080f3c433398e01a93c86
-
SHA256
6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275
-
SHA512
37acf522c41ab06664c5b7860030725a00cae1a4e41fd6f5021cc3d4330b49ddba2435b66abd5c93e5d6a9904794a88d6781b6a7887da3e6f9b200de03ffc8b2
-
SSDEEP
3072:OGJ6NjnHe4UeCxZiyMJ13xtigVsFonHFD7fGMEPdndt:ObLAxMJrMgVsFon1jGL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4316 6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe 4316 6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe"C:\Users\Admin\AppData\Local\Temp\6af97c3368ab2ccada7436325b1088937c0bad457310bab2105eed411a918275.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4316