Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe
Resource
win10v2004-20240802-en
General
-
Target
fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe
-
Size
9.9MB
-
MD5
10f01f79a8bd60370296a9cfba8e73d6
-
SHA1
8921ab7618d6faaa63fac528e8ac245656e77490
-
SHA256
fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c
-
SHA512
f307aea4a000849fc145ffefbb3455e037bcaee2087cc167a4f2207cd899d20f47b51a113b14d9d101ff60d7d72e4bd150bc159309cf9fac285c9ac55f4daa96
-
SSDEEP
196608:17S0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:17RrDjtLKkOa8ps6puAktIz
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3384 fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe"C:\Users\Admin\AppData\Local\Temp\fabd53993e04eeb2b5fb9a462299e3e57d8922ccc9cbf76dd018ea18ad0a986c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f950b980812525d9363ea73261fcb2c4
SHA117e708e418a594f3cfd992e8473f70988c610dcf
SHA2560d006e25982d9dc61276de4922f9e0f14e9cdf38be91e2e62268543ae1bc12be
SHA512207f72915a68edfaaa67d5c2f427a84db6b293cbf691e9960912fc35bd574148b5a8c3713d3fd4c2b14a8ddf29087ca6710e9fa7f62e404994323f71ddfbec63
-
Filesize
6KB
MD565953695decab3163843fe809f3fb47d
SHA1e4714d44fd19136a3fbd0a8d9fb3a9180dc942b1
SHA256837ae1ff736b10c77eb5a2b9c5b9a98b3c91bfe01e83905845d146f8902218a1
SHA512e62a7f9027e52b4fb9c6363395a1e240f6b5515246e8734e54c5a04aa41e3679b6bf07ebb48261cba5966f43c5acba3e9aa28bf401d1af189c4b8f7a2acdf7ef
-
Filesize
38B
MD57b1fe1708f778c528d628afcf826641c
SHA1bf0678f0a8ece899ce27895c92a1beaee5bbe609
SHA256e0bfb08802d9336dcfea4a82471609f28027d9c3c5268be4ef67051b19b59355
SHA5121e2e0c47cc341c33c66e7c05a4dac0cc8478656b83d70555f84780fe13ed7961c26537619a7d529239b0459ac31f4571f83c41e2c7490cb0dea32e705b9b01bf