Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe
Resource
win7-20240704-en
General
-
Target
4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe
-
Size
13.5MB
-
MD5
4eba92d425091b2c852085ceb33c63b2
-
SHA1
c502006610629f93ef782ade68f90e9002a9dc7c
-
SHA256
4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32
-
SHA512
22adf401559c140f3870ed9674ade127661b400b0197fb36341b23fa28142a5e79b98fa6bb42c0d756e12c359a59d023a8646e5edd9422ca30cc2b2cb9319257
-
SSDEEP
196608:EFU9/izPdP/L5KGGRyg+Is678026Zc9KN3DAgUEjMcXPebGGQqm9SXUUnW0G:Z9iPR/nY+IY28KFDfUEjJGHA6Q
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/740-1-0x0000000003AE0000-0x0000000003AEB000-memory.dmp upx behavioral2/memory/740-2-0x0000000003AE0000-0x0000000003AEB000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 740 4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe 740 4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 740 4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe 740 4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe"C:\Users\Admin\AppData\Local\Temp\4c64caeb6c04f7cac778215be665938d61ffd202b4d1624fcb530f15f81d8f32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:740