Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe
Resource
win10v2004-20240802-en
General
-
Target
58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe
-
Size
9.8MB
-
MD5
3029feecbbc6ffb1a4aa10ad9fcc1b2e
-
SHA1
04d6d1d4ffe58ec1862217d54725b26d308bcfee
-
SHA256
58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69
-
SHA512
63e349f93c3adc0e54fa4dfec5109cf1bff26d7447a24f203215b85da05af61877bc26f99939e4d7c24aa4c0dcd723901a07b1c22e98eb7acf834bf220ac3852
-
SSDEEP
98304:AxbdCx4iuy7ynzWQQMIHp7w0rbDdQwNSH6uE2Tp2mqSd18z17wF9vVGyWWyfJprG:A+SSJ7PbDdh0HtQba8z1sjzkAilU4I4
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe"C:\Users\Admin\AppData\Local\Temp\58648a873478f4edbc9cd90970c62f9c189ef2e289bae05a63994fae85b80b69.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5c2b8340ce06695d72c14fad5d292cde4
SHA1a488d779b9a30db7ac6cce11a73023511aa81616
SHA256e7367a2c78647fb2b6a51be872c98ce6b84fb1bdc15728cdb0c175fd9ae0754c
SHA5125b87925da9ecd9dc6bb6f02acc1d580d1f655ed3e05c5bef3fc36ec1bd0e3b19877ebf9d9d1ef377c1dd25180156c56ee54439b7742511a4b500306476727848
-
Filesize
6KB
MD5e331bd6908711861cb8a9a22a621fdf6
SHA108fa2ae38eba298a59418827a59b746ef9a41028
SHA2563b214aef61200d0287a1c4cac7778a1d059b15ef60095b522eb5a23e784ee98f
SHA5121b9d28db98dde4c125a151cd06358cf8dafdae96bc0311761ab1f7ba1ad4a037ed36f5a78d833b825f98bc3f457088f628861cb368745b14ff32cd62ae96fa6e
-
Filesize
38B
MD5ed6f92bc8e6baa6357098fcf2ac6be59
SHA1728d2324c7e9b9ce82af8f7cff2ede02d4f12503
SHA256eda6224e9de45c57e9273ef9c0b223c0e5efa7eee9f12af48bdc1aff4162f1f2
SHA512d4b39797d71b0b80ee89bd6d612e58dbf0c7a5b687351d706042f9f91aab62d1c61d2c2bd780745bf776721813c9479289f8e421d3b0947c0f510959ade9897b