Analysis
-
max time kernel
84s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
30fcceac957643a5f4b0cdd943d8a5b0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
30fcceac957643a5f4b0cdd943d8a5b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
30fcceac957643a5f4b0cdd943d8a5b0N.exe
-
Size
298KB
-
MD5
30fcceac957643a5f4b0cdd943d8a5b0
-
SHA1
21482d6a74a0979584dfa16c19f1c21210b576ec
-
SHA256
dfab3de056fdc85614a7149612d5635eb719dff227cad216090ff889fefda16d
-
SHA512
dcc4f6b780ebc75b5e9270ec625c5eb3cf8497df96deb8eea5ff0c7bbfa6aadfb13e6e5b4b8611b5f409f3034164a3136958ced52475367f55b631bfdc98e8f1
-
SSDEEP
6144:nPUgVStixc3HG09qautTBi3z5+ucX7o21p24SznSxeb4gIzLizHpt:nXStsc3HGnautTwxexebkLizHpt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30fcceac957643a5f4b0cdd943d8a5b0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2172 30fcceac957643a5f4b0cdd943d8a5b0N.exe 2172 30fcceac957643a5f4b0cdd943d8a5b0N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2172 30fcceac957643a5f4b0cdd943d8a5b0N.exe 2172 30fcceac957643a5f4b0cdd943d8a5b0N.exe 2172 30fcceac957643a5f4b0cdd943d8a5b0N.exe 2172 30fcceac957643a5f4b0cdd943d8a5b0N.exe