Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe
Resource
win10v2004-20241007-en
General
-
Target
94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe
-
Size
11.3MB
-
MD5
5dbe5118946ce7ec21eb8c9dd2575095
-
SHA1
315a3fcb109c1045f4371d95121bb6238621a066
-
SHA256
94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275
-
SHA512
20d421004d63ad37edd1d5e510c56ea7272b1df646f2d0c07700221f0b919a5a12b7b8da3fa82b68cced898a2755aa430268c9e5f80e359a4062307fcf7847af
-
SSDEEP
196608:RXFGPpySVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:RXVuf+6poDjBTRxa8psYSUa+arvSP0z
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5008 94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe"C:\Users\Admin\AppData\Local\Temp\94315f872277dcb234a776f9da9b437c68947b7030fbdf8fcaa4ac0b3ed9e275.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD519229a5e3ae739c05f35762f099e8bb5
SHA19493f6011dd3f0162e40e2f113d3de60f1c5c74a
SHA2568d5b72f16af9ec44aa6d80026c706c09c7aed35a09a4a6ee0e30520237d66567
SHA5121be37af1531fbaaa6e6e83f87065b3eab6c7ba19ce05da13941f5d79f92fbecbe6f97e5e94513c29ad36ca33a5b2e92ff0df855404d6b4fb99a9e0b60de5b0e8
-
Filesize
9KB
MD5f9ffa2ea2149ae3f1a7501f62e8ba491
SHA1480ca73413b8dc0dfc11933a87a521e6614dc90f
SHA256de057874d1571ed90ff7cc191f3307ae89bcdf3361ee3e853a18ab43d78b8bdc
SHA5127ba76e78f8a938587bb75b9e589b1226bd93dc4d3a7d3cd63fcb2e835e88ffd62eddb9d5054bbeb067c0bcf74f4aabf935ba4b5ebeefba4db8e21b27684ac7bc
-
Filesize
38B
MD53d592314394650b5497dbcbae34da47f
SHA163599b1a29a03642900c60cb61c7bbc655000508
SHA2565e8e58626e1a41955c2d82f72438fed6b7442e3877f38524ea2b6b184d810f3d
SHA512edd5dfebc7e250986186505e01fb041127c71e6f05f3ba3ba0449fd19c3eeab9e8a77d5e127cccd94bf7a1867be9841c8b56d3c72bb212b9b8fa113bdb6fa4e0