Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 16:49
Behavioral task
behavioral1
Sample
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
Resource
win10v2004-20240802-en
General
-
Target
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
-
Size
483KB
-
MD5
4407e9b5c2822d8df76aeaebe6cc8510
-
SHA1
688fc138a465035489078457c60b982c2814dced
-
SHA256
e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306
-
SHA512
5d1b8d2c71906d73425a22b6edc5e9db7d862109f568ca23d43751ca4e0582c673c58d6f5ced0e444bc81655c66d1fbb7a30bb8a5608a8a776530e3304abf531
-
SSDEEP
6144:rXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcN35Gv:rX7tPMK8ctGe4Dzl4h2QnuPs/Z5qcv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3700 e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe"C:\Users\Admin\AppData\Local\Temp\e02ed5061cdec08c9e33981f0d75819fc74caba852a830679e6e96e913ca8306N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD577b590857b2d280fe5a616b117c13da9
SHA1725b8fc6a4171a50f3bdb4a52df8619e6f6752bf
SHA2565ef5ed1f9200d2ce3ce426d0883b569f55558311a8791ed86be88954dc31e694
SHA5123a3f1225c43bfdd8931d58dc67fd2a1d68ec4eff95e637c3866fd581336652b6f9d9edec771ee16f30ab04928afa065fdc4a640dff1da5a68f18c9c3cc99af99