Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 12:14

General

  • Target

    bb069d2cf3a77f36eba40d719ee413eb1ac7a1958b28d520781560430037a1ab.exe

  • Size

    3.4MB

  • MD5

    6432039c544b6322caeeb0d95ad2ac28

  • SHA1

    ca562a15e430f37adbd7641703fad2e75c56d6a6

  • SHA256

    bb069d2cf3a77f36eba40d719ee413eb1ac7a1958b28d520781560430037a1ab

  • SHA512

    da76982c10c4eed2287bdfa535ec0151d6d8a05bf45b326601d0a2a560ec0cb90c89714da01b1d30254577270880f822c65f32dc7e0816fae2e6c8a9e42d2cea

  • SSDEEP

    49152:E4jvnUx694GEDqMaSGB+dt5LeGSAbtIS/7Uy3lAHcFl0U9jtq8oyZKyfeysT/lRD:FUg94GEDdaQPbtIS/7UglrXO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb069d2cf3a77f36eba40d719ee413eb1ac7a1958b28d520781560430037a1ab.exe
    "C:\Users\Admin\AppData\Local\Temp\bb069d2cf3a77f36eba40d719ee413eb1ac7a1958b28d520781560430037a1ab.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2472-1-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

    Filesize

    4KB

  • memory/2472-2-0x0000000000E90000-0x0000000000E91000-memory.dmp

    Filesize

    4KB