Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:52
Behavioral task
behavioral1
Sample
0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe
-
Size
11.1MB
-
MD5
6854dc76df8df21484b68411ec8f2440
-
SHA1
444a2d5eeaae11d53588269d8063d5541b3f7db5
-
SHA256
0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b
-
SHA512
2eb1fd894d54699aa10c3166d3dd19f865494d63da3a1b8ec4c1c892c70746c508564c1ae48984a4f147114c11df729b00a4ae15aae2b9b52cfc25c2c90d126c
-
SSDEEP
196608:89E1SmoOUBIwO76nF+u96GIrz9e9+TCB3oAr9AZ7jWH6BfqEYdEKHRO:qMoOUBIQnMutIr5e9+uputXgvdEKH
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3000-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3000-13-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/3000-55-0x0000000000400000-0x00000000019DB000-memory.dmp vmprotect behavioral2/memory/3000-11-0x0000000000400000-0x00000000019DB000-memory.dmp vmprotect behavioral2/memory/3000-56-0x0000000000400000-0x00000000019DB000-memory.dmp vmprotect behavioral2/memory/3000-57-0x0000000000400000-0x00000000019DB000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe 3000 0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe"C:\Users\Admin\AppData\Local\Temp\0f1ad92cde1fbca0a7d0cb6438280b872c5593f1c42ef3a4f8624b765d00a31b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3000