Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:41
Behavioral task
behavioral1
Sample
37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe
Resource
win10v2004-20241007-en
General
-
Target
37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe
-
Size
340KB
-
MD5
dbc91a3e70246c48626408c7a0557505
-
SHA1
0389298d2cae2c17a3acdd73d6a451bb07f1c52e
-
SHA256
37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31
-
SHA512
df4f7e5e03999cd388a9d1ff65c3cdca7eb85f49b4e0da9aef2b4812ef9f605a36f3f026f7c084fc0f3f5c6e85fddd5ce88ce2b68754b0f9f08187d6e2268eb1
-
SSDEEP
6144:29c/VM41PvgdHTDtJqWrH1rfc6oeyTeiB0PJo3zz:/71PMPt/rfc6gnf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe 2536 37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe"C:\Users\Admin\AppData\Local\Temp\37b4a3a2feb021f3917e7774dd6acf2ada97981abf811ad4019079ae10ce7b31.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536