Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe
Resource
win7-20240704-en
General
-
Target
00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe
-
Size
678KB
-
MD5
686443cb145ea6d01fbe1e0e329a6ba3
-
SHA1
949d2881fd068dbe8da7bec7910d27e81daf83cb
-
SHA256
00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456
-
SHA512
f8b3cd2d58a25eeecfc96b7fd71e2d0b8a0dc866eaa8fc28b92498bc300957b9a70f12607c0e532d331232772cb243b82bf82b966cd7f1a3a63ef92d7fe1c67e
-
SSDEEP
12288:+KMxo7YNQB2YcKify3idXmen/UmM6+6pTwUgh/r/0zGg1XZ:/MKwQ8siK3hwC96c/OG
Malware Config
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2688 00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe"C:\Users\Admin\AppData\Local\Temp\00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688