Overview
overview
3Static
static
3KeyGens/DA...LL.exe
windows7-x64
3KeyGens/DA...LL.exe
windows10-2004-x64
3KeyGens/DA...XI.dll
windows7-x64
3KeyGens/DA...XI.dll
windows10-2004-x64
3KeyGens/Xe...er.exe
windows7-x64
3KeyGens/Xe...er.exe
windows10-2004-x64
3KeyGens/Xe....2.exe
windows7-x64
3KeyGens/Xe....2.exe
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
KeyGens/DAS WIS DEV FULL/Keygen Das Wis FULL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KeyGens/DAS WIS DEV FULL/Keygen Das Wis FULL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KeyGens/DAS WIS DEV FULL/TAXI.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
KeyGens/DAS WIS DEV FULL/TAXI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
KeyGens/Xentry Developer.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
KeyGens/Xentry Developer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
KeyGens/Xentry_Patcher_Free3.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
KeyGens/Xentry_Patcher_Free3.2.exe
Resource
win10v2004-20240802-en
General
-
Target
KeyGens/Xentry Developer.exe
-
Size
2.7MB
-
MD5
f935af83ed74c209ebedbf00d12d9d50
-
SHA1
393aeea474b411812d716d7d320e84b76d107e61
-
SHA256
153c7a49e584cc39c652253c89f59dee4bd679b1d5e45f20c92e21d0b5fdc1c4
-
SHA512
d9730bb988249eb3f15e9651f7c3b799aafd4809ba0994a9abff85d3d3134862f444df6dc239a89971a2336e365a30c856f5e0c6af7596da3e8fa97cad7f6ec6
-
SSDEEP
24576:2cQnHjxGqBicM6NyBNCpuXAymf45RnsqEQhkbTQ/FlzpZ:2cQnlrle5RphsTUf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xentry Developer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3364 Xentry Developer.exe 3364 Xentry Developer.exe