Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe
Resource
win10v2004-20240802-en
General
-
Target
5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe
-
Size
10.9MB
-
MD5
886f374b93a77262b67a54f30e6041a8
-
SHA1
38bb5c1fc811978b010685ee1015493fc59fc1fb
-
SHA256
5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc
-
SHA512
e8be6b52f0ac3d907a3c5feb628bb936978bb70c2039ca8f2e25ade0ba0611b2cdd424e672907930cc4f0b062ace36ba983c01ba786c2e4f04e7e2df075db609
-
SSDEEP
196608:FUWWPa65SSJ7PbDdh0HtQba8z1sjzkAilU4I4:FUWW5J7PbDjOQba8psjzyz
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4960 5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe"C:\Users\Admin\AppData\Local\Temp\5bb58b960ef454ee919d514552478e5029f88e32aa3e5134c02cdad938ab0afc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59e36de4cc2d4ddb0305ebfa19a28ed09
SHA1d9c17058b63da17bd6e3a08d3b3d2f514a1953da
SHA2562b4e6b7540fd609095c387f37bf49335388cfd0c1f9028f6cf9ac5ab58a80377
SHA51222003532e9ccb4aa796802597ef1652de556d1ca884be6d5800aa63404837e22df3f5ef3d78a36bba81e68a94259581b91b9d66fda1614b05f853db3884308e0
-
Filesize
38B
MD5035c000a8966b189782012c3510d6a60
SHA17582af587d2861871517797d220587d2b41c64bf
SHA256af5e65f63e5ace0e2f4ddbb30db29a43e5b65ce98e40c3dd27e68dc53e814d92
SHA512a13ecd707a743408791b52fcaa4a196ba16fe4328ca3207e5276d0ee736bc28d599790eaa284bb69bc3b1bb681be68fecad5618b1dc17c63fe2173ab27f5e8e4