Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 01:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1nk.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1nk.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1nk.exe
-
Size
6.9MB
-
MD5
a49d47a9588316ec6dd3b317cbe70e31
-
SHA1
199920cacbcf1b4b063c45020142246676c404aa
-
SHA256
e36a6e97ec26a7993619c3aa0ca81765933c9ffad1fd8677e37f6ee0dc94325a
-
SHA512
b6b2275038d42f1ad85b04bd0516325c833746ff7ca22a9fe610da724e414cb755286581ad011f6fd584a8997f9d769218b0b09cb840aa1176b0f929738d8699
-
SSDEEP
196608:+rgtoWli/FTuh6zQ4qWWIioElER//b+2+m+yh/:+kaFtZclER//VQy5
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3692 1nk.exe