Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 03:34
Behavioral task
behavioral1
Sample
344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe
Resource
win10v2004-20240802-en
General
-
Target
344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe
-
Size
483KB
-
MD5
39929a185df693259910621ae76c4506
-
SHA1
26814268f5ac86d2603d06c28dcb349fd712cd1d
-
SHA256
344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706
-
SHA512
fa9890e9872e36ea3742bf6e91e7635c88d019930bb28c7ba2f2b8301b855f956f48f029444f9a0bcedd2d9b2bb9818539b8ab85decfe6adaea4ef031591d1df
-
SSDEEP
6144:wTz+c6KHYBhDc1RGJPv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccr/aT4:wTlrYw1RU33NFn+N5WfIQIjbs/ZBNT4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2080 344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe"C:\Users\Admin\AppData\Local\Temp\344eeb88cd808140a7528ef191335bc3a70fd0f29aee682f6febe4b900b03706.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b6a260c1b181f02f045babb5a2c75c8a
SHA187eebd0870bd85189711fbf4435cfd677d2c15f7
SHA2565552aa9b2979f6eb6872226cf5fc19a38c4c4ef3dd2412d1196eb565847157d2
SHA512c9b55b3f85eb75651241e9efb4aa98a8ae54a2e774b2e4b465146b5ee8c79d7db2d8a545e89b48ebbfafd603c7fe66f510ee9561f865bf8f026395baa077a0e8