Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 16:49
Behavioral task
behavioral1
Sample
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
Resource
win10v2004-20240802-en
General
-
Target
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
-
Size
483KB
-
MD5
4407e9b5c2822d8df76aeaebe6cc8510
-
SHA1
688fc138a465035489078457c60b982c2814dced
-
SHA256
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306
-
SHA512
5d1b8d2c71906d73425a22b6edc5e9db7d862109f568ca23d43751ca4e0582c673c58d6f5ced0e444bc81655c66d1fbb7a30bb8a5608a8a776530e3304abf531
-
SSDEEP
6144:rXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcN35Gv:rX7tPMK8ctGe4Dzl4h2QnuPs/Z5qcv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1856 e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe"C:\Users\Admin\AppData\Local\Temp\e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5e2227a1a777c5e28d0e5948ad69f02e4
SHA15fd7e1cefe5866a454cb6324c79473687d20544c
SHA25699fddc61ad32195784904a3c66aa4f6b382fc63fbf3e5eb018a43ed4fb66146a
SHA512c003cdd92574159429e5c145a11ce0248bdea58efb7cc87a97574a85dec45d1ee373cc86c104a58ef137e1ab2316a1bb23548f6f468612c28ffdef73b496297b