Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 00:13

General

  • Target

    a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb.exe

  • Size

    168KB

  • MD5

    d81e2e75046f8bb2a35edf7c5a9210e3

  • SHA1

    a0a7f8cc912ea6e702e4c3283e49c7807939b163

  • SHA256

    a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb

  • SHA512

    42b3a5c6445269d32b5ddaddb63a1be922956c297ca14364f13c8729d266d3e61d7c9bc9ef04658d1b54b0ed2eeeba64ddf174e59edfefa97fda4215eeb645fe

  • SSDEEP

    3072:RikvaSbA5W6nPtznKYC85R1u0Ogsiopuo4Obvxt/NxY5MQwgNdNf7D:Ekv3bIHtzKpqybJNnTNxUMVC97D

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb.exe
    "C:\Users\Admin\AppData\Local\Temp\a65a3b8dcf79bc574d64f332e6156cc4ba0a14d5bd5589ad4f9c207e3b25c6fb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bugreport_error.ini

    Filesize

    107B

    MD5

    ba9bdc640afb93103ea5a70010cb8714

    SHA1

    2ff2025d9b2daa1a443c2b7eb1729b8c0a51ca7b

    SHA256

    409f189c72de0c8448ec8d6db0e6ff454df196d4fd9abb4e2b28d1dbe44fe153

    SHA512

    4d3286c0decd73fbe6fc00d9f049969c50908f0afdffa1f151b8fdfd872ffecdffc63397a99f3db4fd8f64caf984fd68b9c7a836a264e9d8fe3e542198bebb2e

  • memory/3720-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/3720-12-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB