Overview
overview
10Static
static
100468127a19...1f.exe
windows11-21h2-x64
32a3b92f618...6b.exe
windows11-21h2-x64
10b154ac015c...cf.exe
windows11-21h2-x64
8b96bd6bbf0...69.exe
windows11-21h2-x64
10bb8e52face...3e.dll
windows11-21h2-x64
8ca467e3323...a4.dll
windows11-21h2-x64
8e93d6f4ce3...ad.exe
windows11-21h2-x64
10fa5390bbcc...f6.exe
windows11-21h2-x64
10Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-12-2024 13:45
Behavioral task
behavioral1
Sample
0468127a19daf4c7bc41015c5640fe1f.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
2a3b92f6180367306d750e59c9b6446b.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
b154ac015c0d1d6250032f63c749f9cf.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
b96bd6bbf0e3f4f98b606a2ab5db4a69.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bb8e52face5b076cc890bbfaaf4bb73e.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
ca467e332368cbae652245faa4978aa4.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
e93d6f4ce34d4f594d7aed76cfde0fad.exe
Resource
win11-20241007-en
General
-
Target
b154ac015c0d1d6250032f63c749f9cf.exe
-
Size
457KB
-
MD5
b154ac015c0d1d6250032f63c749f9cf
-
SHA1
c96eab62367bd9efb5e124621d8dc2be7c5a61be
-
SHA256
f33c78cddcf99dd999b065644a17dcbac1b222a7f3342b3fe3293ddb6ecf0060
-
SHA512
dec37485f6e9e9109fa954d5e024223f555af7c2b12f5c9855aa77b43e97d5e54f4cdc651331eee2c7fcaf0a3fa58bb41222cdb3ce16c84b444ef564e7ce6eeb
-
SSDEEP
12288:vw4bw/3KjP7bHnREf60JDQJ1MFrhi9PFBVoI+kA3dz+YsM9jMw9pMQH/Nxct+fbN:I4bw/3KjP7bHnREf60JDQJ1MFrhi9PFE
Malware Config
Signatures
-
Modifies RDP port number used by Windows 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b154ac015c0d1d6250032f63c749f9cf.exe