Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
53c7e76044eb7a8297f8c2688a49a470N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53c7e76044eb7a8297f8c2688a49a470N.exe
Resource
win10v2004-20240802-en
General
-
Target
53c7e76044eb7a8297f8c2688a49a470N.exe
-
Size
184KB
-
MD5
53c7e76044eb7a8297f8c2688a49a470
-
SHA1
fb8f5e4ab1d475f99b717a014ada334b30470fbc
-
SHA256
9b199e3a7e6da0b8b79407fdfd3f4f529dd624063658808b131bc5856c8db939
-
SHA512
7a2aff394e89ca975c69fd7ea7a21098491e1f73b58d077d9942515495e1014d9b6233fb730c9b6a9f991c00946eca8dc3352b50fa6a6e21131b211c7f888fc7
-
SSDEEP
1536:y29Btz2skGUGBCgWfsOvNBrmxzNTLcOqAEHYE88DzsssssssssaPsssssssAgyMk:y2bMskGJ5AvNY/QOCHYE8Ss
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\zengzhi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\53c7e76044eb7a8297f8c2688a49a470N.exe" 53c7e76044eb7a8297f8c2688a49a470N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53c7e76044eb7a8297f8c2688a49a470N.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1796 53c7e76044eb7a8297f8c2688a49a470N.exe 1796 53c7e76044eb7a8297f8c2688a49a470N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c7e76044eb7a8297f8c2688a49a470N.exe"C:\Users\Admin\AppData\Local\Temp\53c7e76044eb7a8297f8c2688a49a470N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1796