Analysis
-
max time kernel
12s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 13:43
Behavioral task
behavioral1
Sample
ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe
-
Size
5.8MB
-
MD5
4b9539a29c1bf9daea73e386089ab033
-
SHA1
ba62ed0df175025ae1e110dc1ef013a5a2136dd4
-
SHA256
ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa
-
SHA512
e009be0f1b302276a708f96e06fc89479b860568432650ee00ca81aae6c4f3b5b3cbfb0b068f9e789a1663bd213130fcf9c7504738e675bd166d7e85ee7f0954
-
SSDEEP
98304:p/LDMisQn5IoA0dXeQgYCJc1xr67lgioEf5bZ6qxYNqxDGb4oGRhW:phs+I0vzUEr6Bg+hEPNCDGMoX
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2876-7-0x0000000000400000-0x0000000000E12000-memory.dmp vmprotect behavioral1/memory/2876-9-0x0000000000400000-0x0000000000E12000-memory.dmp vmprotect behavioral1/memory/2876-10-0x0000000000400000-0x0000000000E12000-memory.dmp vmprotect behavioral1/memory/2876-12-0x0000000000400000-0x0000000000E12000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2876 ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2876 ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe 2876 ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe"C:\Users\Admin\AppData\Local\Temp\ca77acfb2baa4e0b4960549fe0afbf40f753ee9614bb83ed5acbd848c2261caa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2876