Analysis

  • max time kernel
    111s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 15:55

General

  • Target

    abb77e672ec2cbfb12a295493e42d0bc1fa6468786b0535ca84c1779df46ec49.exe

  • Size

    1.3MB

  • MD5

    fb1d837552a3ee3dbf698bd11762d4f3

  • SHA1

    8183b9cce34982330cdc7d934f01580d8abb6e13

  • SHA256

    abb77e672ec2cbfb12a295493e42d0bc1fa6468786b0535ca84c1779df46ec49

  • SHA512

    9a52a8e527ebacace82feed10de6e5d8a5dc1ccdd8ffda41c74ba264969d78a31de82dd78191388810bf3addcb2fd8ff6a86b13678181a7b83a6914a13f412c6

  • SSDEEP

    24576:v0hejcUN39WH5n9/xnJnoXlG424rccrrhFwvqwURnaJr8:8EjcUiH59ilG4hrc88+JG8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abb77e672ec2cbfb12a295493e42d0bc1fa6468786b0535ca84c1779df46ec49.exe
    "C:\Users\Admin\AppData\Local\Temp\abb77e672ec2cbfb12a295493e42d0bc1fa6468786b0535ca84c1779df46ec49.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads