Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 03:34
Behavioral task
behavioral1
Sample
13e2266694c6d450ed6320e775ea6ca0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13e2266694c6d450ed6320e775ea6ca0N.exe
Resource
win10v2004-20240802-en
General
-
Target
13e2266694c6d450ed6320e775ea6ca0N.exe
-
Size
483KB
-
MD5
13e2266694c6d450ed6320e775ea6ca0
-
SHA1
2a700c9c8179aec8c1f3b5e51adf064655694202
-
SHA256
14fafc8d570493d28077c853810754b4f5f7c803a58bf05456d4d197862191b4
-
SHA512
121f24d2433bd3c0b60126259e12ce2c990aef48635f5297ec37db9ce3337301408b6b2f4562936d803341c40e4f68ed51ccc05319920c8d7b0300b007d8600e
-
SSDEEP
12288:wTlrYw1RUh3NFn+N5WfIQIjbs/ZB1fT4:ApRUh3NDfIQIjeZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13e2266694c6d450ed6320e775ea6ca0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1540 13e2266694c6d450ed6320e775ea6ca0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d5fc5b4a8457fa3749728d3a7806de62
SHA12480e8f7e6648e4949585633dd6812d363f78ef1
SHA256bc25dbd5f6bff4b5b5ac6bd59733c388ef995b9fd1a54795526f5a79c89f1792
SHA512219eeedb7a54b8161b0ebba5f216c8568bc154b854c615a3414ec7d35a866ce040b0d12a3302f44efe050838cef65f56ffa13133857c73c59de099c89045975c