Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe
Resource
win10v2004-20240802-en
General
-
Target
9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe
-
Size
10.4MB
-
MD5
9936e0a9591fdae3bad8509e269b5ac5
-
SHA1
77c6c241a1c572e92f31dceac47deac4bc398078
-
SHA256
9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a
-
SHA512
c09a44323f35ecf44a3e02c9fb77678d6dff91a09743bc3ef373e255a293bbaf4859409e6459c9ad3b8735ae50ff0fe906ba9ce1e7e46ce59b805576018f042b
-
SSDEEP
196608:BKSSSJ7PbDdh0HtQba8z1sjzkAilU4I4:J5J7PbDjOQba8psjzyz
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3600 9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe"C:\Users\Admin\AppData\Local\Temp\9fecad97b0d176ec490f5246430fe4978f065a28a35f9e6ba247f3dd544f6f7a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD536b2ac37828f4fa1d9f39085b2585e98
SHA1dcd6a8c587d0073f5ff34e382d6b5c200da2fb32
SHA2560ec2881dd206a5cc56ce54863c0a364619e06f6db4dd59a1df834c8b9a596959
SHA512a62cc02fe196b01d923ece41d77c1ce54886f91f8c1b806ae081f286b57bdccb5821c630f707b35e0a3ac6bfa67bb1447fa34c879f7f42dd2f7a3c532a0fd3b6
-
Filesize
3KB
MD5b37abd6e1a9cf81d64ceb66b7d8e5e5e
SHA130324341fef1d079abfb7de38278907467275c90
SHA256c048168d3fd343287207d5ce37e562fc674fef483ddd062d04a2280ecd30b602
SHA512d15da1d1d094efc0fd262b28520e0afc3f60c6560bb03ea8f1f7f147299bc233d1976b4833a58ef6dbd731d1c25a04b482442798e2984b55a4bfffe885261bc0
-
Filesize
6KB
MD5d0df62ede1bd46c47935a2642d4737ee
SHA108aae6f81c4010007eb2dfbcad2e726cc426ca40
SHA25666c03f0030de3937680fe144422e6d7b420e9667dc37ea68e2cbc8d869c546cf
SHA51287c58059e5c8bbf5c4b070b89eca17fef29d6d8642d5d23fc9aff9265cad87bc84bd46d643963c44357aa1914be87306852df705259bf7c4d9a91989a07acd01
-
Filesize
38B
MD576634fafbd05b3115c49846aae3b805e
SHA14a39ccf4e51567fbe1e2ec349d9229ffbe70e2b1
SHA256af38fbea03df00b4f2dd356a82b6a8d42ee8851874de07bcd73fe17a7a13cdf9
SHA51283c6ef1d3a31ef558f8df53642d786100770bca7ad43df7a3d2eb61bda9619989241de28b99d6e6fd002d3572323186ae70456256f80948ee5957e145bad03bd