Analysis
-
max time kernel
178s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 21:07
Behavioral task
behavioral1
Sample
ded2e84649f2d5ce1a1e337f7e078607.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ded2e84649f2d5ce1a1e337f7e078607.exe
Resource
win10v2004-20241007-en
General
-
Target
ded2e84649f2d5ce1a1e337f7e078607.exe
-
Size
482KB
-
MD5
ded2e84649f2d5ce1a1e337f7e078607
-
SHA1
527a42307997fd9a9765ad26ccb30ef7fbf61555
-
SHA256
8437a1cef307ece5da1d58f9e7eab7dde8a34776cfa51b975ab906b050698e23
-
SHA512
30032c61ea6edb6298ff7f5776ba126abc3d4715c7e33c240cbc2da47c3d8c268674007cbed08dd9eae37e44b9f989ffe84eaa2c2f44570c9236a7cc76b48336
-
SSDEEP
6144:jTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZmAX4crnT4:jTlrYw1RUh3NFn+N5WfIQIjbs/ZmAT4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded2e84649f2d5ce1a1e337f7e078607.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1948 ded2e84649f2d5ce1a1e337f7e078607.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD531f15b1583979f8fa221ec2c221a0922
SHA1a2b6e2c18f410194920b27d2f153ceaf120fc20d
SHA2567702126d8d8db63872ffef08dff618235d42f852bbaf7980e7e96ad5d6f48e1b
SHA512d440dc33dd1609da90a28917cfac8400b24cfa8a11c5e35dea23ba9d8985d710cb3f9e19acfe5087c96ae2a7bac1fdaaf7c2c6921eb1e49ba551702020d56cf9