Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe
Resource
win10v2004-20240802-en
General
-
Target
931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe
-
Size
9.9MB
-
MD5
b46fdce80fc48b3ce353b3ac07698011
-
SHA1
8653d69f8e3f6c06e58d56e4f91245d01e026183
-
SHA256
931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2
-
SHA512
866f37a8ccf68657049ce284bf76db628dde6ef0b7415ca757ba3db1aef5158036248fb3dc4c42a1325169025f78eaca5b1b3e775bbdfda29002ab91cbba042d
-
SSDEEP
196608:1A7hSSJ7PbDdh0HtQba8z1sjzkAilU4I4:1mh5J7PbDjOQba8psjzyz
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2120 931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe 2120 931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe"C:\Users\Admin\AppData\Local\Temp\931aee3b035d7700193344dee16d11751d00e6d65fe9974ab42413c708c8f1b2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5caab769b083ed01e053d3c8b5015f38e
SHA1cb3b7d6cfa4f88ece389a57e3b9086cc99f9b331
SHA25625c68bfdb00def20eb28cedd3f07be8b7db7cfe0db72fa5f743f49929ebbae9e
SHA512319e79a9f73914805012b02d4b364a7ffa04e94923807d1b13bbe2ead48b3f3b7de2af88497a833b3d038c2e0c71a6fa8ef8a83bd373d790b623730b539175b6
-
Filesize
2KB
MD5d73316cd3d173a25a2fb8e0d0eeb08f8
SHA157fc59f4d582a29d1f126f3b3b0379db21069c10
SHA256da438b07f59f003363709de16bfe73abfb3d2d78133bde7d2ceee1867c7752bb
SHA512dddeb2279a11df2e097a4b95be5ce1db3236bf92ef5a23e74a3868b7746f875581b0a759b06901d358342a99a432b7ef8d4a87e7ba283b573a49b297231e7f8d
-
Filesize
38B
MD54b8027c1c03ae6a3ff790a0c7fd48797
SHA1fa34bf202568394f1476da8d108994b848963de7
SHA25697d3329255ec8830812c9da0adca5a70cef56522157725d8aed3109d8fe33f12
SHA512eb6e5e30e0887cee43dcdff23c69277ac2706163791db03efbb1420ded0bbcc6e7562f65475b2c7934443125f3b65f0d3e9f68ba9ee5c8d1386a604f04315e0e