Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 13:24
Behavioral task
behavioral1
Sample
08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe
Resource
win10v2004-20240802-en
General
-
Target
08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe
-
Size
482KB
-
MD5
599d0aacc8a8b93e5aa5a2eae248cb01
-
SHA1
7c12c80ebd48295dd21ec15be849ca22015e7d08
-
SHA256
08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e
-
SHA512
ee83365b54c8ea5a011734cecfec202df1a786ebaec98af977670d235b7cc7d3c7e38f2994e7e3daaa1167d309a41df84bff28495d07c23ca1a97077ce790feb
-
SSDEEP
6144:7Tz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4creT4:7TlrYw1RUh3NFn+N5WfIQIjbs/ZmtT4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3376 08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe"C:\Users\Admin\AppData\Local\Temp\08d6f9ddd03aafd9ccc617f25af984cfe801206fc1c1b8e7a8cb6c66ea73cb2e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD59533e23d462e901de95db0a04e2f83fe
SHA106a612db077bef58faded83c5436bf94279270e3
SHA2565c9330acb7a9e732c881a304cac1af5ad68dfdb099355a9b6444978a5d5be0b0
SHA5128c2bbde22e01a0afd4600890e68e6ef0a098222ab5533ce6ccf1caa3f6c57ef5a25da6fe632e22258cc6f82e0bd911f67d2ffcf62d4f1b6065d858909715e6ae