Analysis
-
max time kernel
94s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe
Resource
win10v2004-20240802-en
General
-
Target
c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe
-
Size
2.1MB
-
MD5
6d59e3be2c3c26aec0c8ac39d8e3988c
-
SHA1
dae24a17140af9f1e6eaed020b533a9960e79585
-
SHA256
c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad
-
SHA512
e4bbfb3d0808761871a60946cf311a97b0b2597009389d13e88434fd96968a3ee022caeda6cb3c01a8ea27e650cefb868e9c689d7096e12dc29c913d2e285243
-
SSDEEP
24576:/06nmGhP82J0dPRt0FjXfqCNduHiSsw/Xt5wzGCqUJvk//TcJLEY87jEG3Jmy:/f3n0dryCCNcQ/e/QJ2wcZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4440 c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe 4440 c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4440 c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe 4440 c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe 4440 c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe"C:\Users\Admin\AppData\Local\Temp\c2375a7fbb7789ede0b333ab87cf9af6be130ed42af8768b86e278da999f24ad.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4440