Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:43
Behavioral task
behavioral1
Sample
28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe
Resource
win10v2004-20241007-en
General
-
Target
28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe
-
Size
164KB
-
MD5
a4ba63235098607413a0afab4df38535
-
SHA1
25c18941ada5b570f53c0c5537c269ec46408ebf
-
SHA256
28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798
-
SHA512
33284d81f3ca7baae318cf36455693693f283b570c35a5538fcbe040ccb43df88590a2f49a954a07134342cd0ec717e1c89f03386f414234c33bd31314439277
-
SSDEEP
3072:SJJUgt9vj8yY+k47GhiFMgW9C3rIENf4ncVOxwWLSouY1/pO:S4asTWMggk0ENf44Oxb7/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe 2728 28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe"C:\Users\Admin\AppData\Local\Temp\28042692f65fdf0d71957be60fa390ff0b0e2086c3b7f0fc0f7c4f9f83815798.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2728