Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe
Resource
win10v2004-20240802-en
General
-
Target
aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe
-
Size
10.0MB
-
MD5
b1500089c04e47fb9c326903a9745f1f
-
SHA1
9be5db40099fbd19fa2b515e6407bdeec4fb372e
-
SHA256
aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18
-
SHA512
52c2605f10c4a0fb65fa8509040676e4533a39498ce2cca6048922c0ee6a579d2e421c566e57417209d7407b46d0fa516b8b388c365e41e60533492557bf321d
-
SSDEEP
196608:n4NS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:nmRrDjtLKkOa8ps6puAktIz
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2520 aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe 2520 aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2520 aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe"C:\Users\Admin\AppData\Local\Temp\aad633ca10d25a8511530020711973c45e7fc60207b9266d662f249b37556b18.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a7db78e71534f6aba6ab610c6b6c4076
SHA1f63cfc7b8d4a579ed7508a46a95280729ba4769e
SHA256af2bf46c2942ceb43aa65c9ea8662e74034de5526da731696de8d14c2e16cb3f
SHA512acd56145ec56804d12ce39c79a1c6f366292f600192034ea69af4a951e34ce7e3257d0dd6ccd72de73de1be003083881973b4eabf2dd34ffe6c072ffa71c33b2
-
Filesize
2KB
MD5e0d76a47f90cc8f73758db7e53f3ad25
SHA1da65d7eb38b4ad96d3f9a521eaa9b7dfc3071b53
SHA256457227e4637cfb6fc72961b228a89611cbb491e6bd49e49358148548d3cf12fd
SHA5128c14d6d08f5208acaf650b0fc77568cb5d6b304f80759edb56c9ca19df419c0e67bdca6ed9eafe06314f8aaee60b9186416098794f6a5349cb55ffc731605402
-
Filesize
38B
MD5418e9de17801e76f0d62d1a7d28afd53
SHA12dcf4a5c897e7e47b68780d9b07971ceae7e6e23
SHA256188b211e288d4767bac6380f48b8abe9540ebd9990bf400bca560929889d7b22
SHA512c600ffef1cd6b7f5209c1cc54877b9ad991c98848ea266d03e01aca98ebe49c4e5648253ce04e4d7e2a22f068d60a3f4dfcdeebf93cae76e9c075aa8e80ecb96