Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 15:31
Behavioral task
behavioral1
Sample
1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe
Resource
win7-20240704-en
General
-
Target
1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe
-
Size
13.7MB
-
MD5
7119aff629e2d7c309343599775a07f5
-
SHA1
f7a1736499c4af1c3bc1d8f565b2e8a84fdcd088
-
SHA256
1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290
-
SHA512
a750924d6049e2fac10056a71daccd04e599f4660bd3b310213e6eb91cc2fa4f4d060ecc2bca54f2e42f1724e76af1fa65221c55a5989d8d663d84d563d0815e
-
SSDEEP
393216:ryGLMq8IkAUKE5YNdMbM7Se/APd8rksdP2:mG4AbWYNROe/APdp
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3056-7-0x00000000004D0000-0x0000000003161000-memory.dmp upx behavioral2/memory/3056-9-0x00000000004D0000-0x0000000003161000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3056 1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe 3056 1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe 3056 1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe"C:\Users\Admin\AppData\Local\Temp\1334cde60c767d75e1a12de2e04b8d76fc22c48ce4e07c2ee6451e28eb35b290.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5d4320487bf3021f2f2afcfc43d652a69
SHA1f94503fea3fa7c526a70187444affd7f0e0e8926
SHA2569af0b89c5c54eb66e5a660b61aee7c1a25b1c92e20a310d8b16552abcf90c0b5
SHA51238cbfb45ebfbb95a5bb67060792331fde6ef471e1e98434027d73025a10c8dd071141fe44c268015b73855fda1380c8b6024a08cb4fec6b443ae24d38fdcf6e6