Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 03:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe
Resource
win10v2004-20240910-en
General
-
Target
bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe
-
Size
468KB
-
MD5
1f843eb5068898cd515c79d118120ed0
-
SHA1
c0fb47f141b17bfd2f6e3db71fdf9c7d5ac9f097
-
SHA256
bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33e
-
SHA512
32280cce48b2c416ee38974ece5546fbdf1a28c6c114a12eb46ad23cc536b56258e5b1490c4501cf25df52dc68e695c3279e74d923ef84e19d0faf573a684d5a
-
SSDEEP
3072:8uhCoilZX03YtbHEPzcjff/sEWhWGIpp81HCkdhexODcegkN/XlM:8uUosOYtYP4jffQ0VPxOAPkN/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe"C:\Users\Admin\AppData\Local\Temp\bea9607b8bceaf7de0d267414f1f7639b61a791773f42bc39802add9f081c33eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD57dc927250ff4222d531cc3b2ad1b2bc8
SHA1d2dea9f1cb1b6ce6d44b035840f752aeaf54894b
SHA25605c86f4fb4eeee080bdab763d02238d6413c27cf21cd0e6a0f0c74a2a5060bc5
SHA512d808c65c36a14195b9b461a7552e966a12462c8810e0111d5c1afdd009ed8edf844e144d032c4656557cff189cd42331be9519441606ed323f7613abe5311898