Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-02-2025 08:39
Static task
static1
1 signatures
General
-
Target
gtyh.exe
-
Size
5.8MB
-
MD5
6d5cebde81333a9a52af275d3bca0997
-
SHA1
0646f411acf97c8be18aab7cb781fa5ab3748be5
-
SHA256
c6b12c28095e88c3518deef40a010668e4690e00ebf14219fb0e094123a002b8
-
SHA512
8964f91f4114912e88d51ebb3577ea64fe456373e0a3c51cba20d6fbb76db21197222b5c9cd2801fc5ab8bc32bf46c8a345d1a62daed5db2beb8d7fb3d487db2
-
SSDEEP
98304:ug3hjD7tDygitl/uBqSpATRdvN4Co1+aiutddpttMVQepqKzqJkA:u67t2R/uBqSpAT1hoxtdqQFK+iA
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtyh.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe 1220 gtyh.exe