Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe
Resource
win10v2004-20240802-en
General
-
Target
b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe
-
Size
880KB
-
MD5
3e1e2690bb33f69830974573189fe12c
-
SHA1
1229ef56ef342ff07c7b88c1589c342a3063fb4d
-
SHA256
b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a
-
SHA512
2946db499dd7d3e5418ae5c344b7bd55777d76ed8ea9a0a66de5769b4b64c840067cb95c58c595b6a5d0cd189d1cc7fefb77408d1dd77e290407ab4d80e2e9c0
-
SSDEEP
12288:C//Oh8/iHGPkLV8AKs8kaqwiqshwAtCgMGnwxs8oH4:C/Gh8/i4kx8bs8mwLGwxNT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe 2680 b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe"C:\Users\Admin\AppData\Local\Temp\b365c34e91b4851ed95ff20347c04e007ffcb01b4021ef3ef1adeb0cde63441a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680