Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe
Resource
win10v2004-20240802-en
General
-
Target
59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe
-
Size
10.9MB
-
MD5
6a590f45a233338520131a53248f8f65
-
SHA1
a45eaed1a6817fafd4d4a2f5da8bda23abc0a45a
-
SHA256
59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219
-
SHA512
4b4399aecda1b46fa4b34489e53f70162b7a6cb5409753ebeec7a1e34f3e3c08de1fed371de5f56561d82acdc4704f16f5e912ab066b252fccb9c050c54f67ca
-
SSDEEP
196608:FUWWPa65SSJ7PbDdh0HtQba8z1sjzkAilU4I4:FUWW5J7PbDjOQba8psjzyz
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2096 59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe"C:\Users\Admin\AppData\Local\Temp\59b58fd159e78440a8803a51bcbf7960ad511327fa96ef96bece3fa716ae4219.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54ba9f7bbea4d69034dd708478453bc38
SHA13b846780f7fa14cec2b1ab49eac5adbe6427ee8e
SHA2561f792e89bd2754a0370bd597c57b88e0cc2a093aa8f0dfae40a41f1d242a1402
SHA512f5cec50b925f3dfcb17d93fc3e61fc7b1bc93ecfa5e3393ebface48158329c6f13396508ab0cf214f877d878c0dda1c0b806f9c703ec5bc8753cd74eec7f76c3
-
Filesize
5KB
MD59f044b1b78b234a4c0380d3d82cc8467
SHA136e519f6106fcd5d7922a1ece70a2fd080d101eb
SHA25655acca3036f8a1b73d6d8031b42c0fe8686edb40fb7d6d3ac644441d190dbd02
SHA512b60b160c2e3e4e9cb95553296ba8b737a131c0ce4cd644ad67b5051ee40031db52e7c18b11d387600dcd4b791325a4a97d401bb2c6952bbf092412b8c925f792
-
Filesize
38B
MD5e3f62ffd098f928dc70dd20e2a2377cb
SHA164c884a0c1cf830e12d0db20ff04731b6a466eda
SHA2565ff76b6b905888c4915f50c9f46b3b02f2e95a624e9b4d7c4e75ca8a13d63642
SHA5126d2a1ad0c9276d593fd60e9a1bdf296d951d25923901e4553ed630f1598174eb2a97036daa1b44e7659c011f5551f383a51a745e76ad364a49a043af088ef184