Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe
Resource
win10v2004-20240802-en
General
-
Target
35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe
-
Size
760KB
-
MD5
fcf267673af23c0e4dde39c00801d98c
-
SHA1
e41a11309df5726c2255b336dbd73333ebfbf551
-
SHA256
35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9
-
SHA512
dd0b69c626840e5a3cd6cf436f1dbf4a93b24998fa99fde9cdfadaa3b46828633b1f368e0433d0e19ebfcecc804e905ffcdf152acb88f89ea41c10a689942ecd
-
SSDEEP
12288:nvCgMx+r3BxJIpnDX0XHh85ibqViG58kLWQ7WxWTTWWTUaxa1fdv1FR1XvjTLz1p:nvwsrx0ibqViG/M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe"C:\Users\Admin\AppData\Local\Temp\35dc1bd7ba7a20d059d3fe5f937282369998023011e7bd0b78112be15e3981a9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2948