Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe
Resource
win10v2004-20241007-en
General
-
Target
0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe
-
Size
11.3MB
-
MD5
e3f1c3b9bad4e6eecbc15248a9a3f5f1
-
SHA1
0fb5c0eb3afe5dca042d110562d0da698931382e
-
SHA256
0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa
-
SHA512
a8f66c9d9b385a253eab919966ea789d4f42956241779b31d8a43f53ecab001d41a370934c704d63e00561708a6d2d04697c76ed65013e049b20453fbbcec7e8
-
SSDEEP
196608:RXFGPpySVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:RXVuf+6poDjBTRxa8psYSUa+arvSP0z
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4844 0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe"C:\Users\Admin\AppData\Local\Temp\0d0b90fa283b546352f20eb814543d2e6e9e0391044499712140d6eac8b59aaa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5853dbdd50501f7042346e8cdd3cb666e
SHA12e20fe9775d16d8a323305bf6d24a8c7a0e54326
SHA25671e16fc1119b2f820f339cf32d7a26fbfc538be11bfc13763b2ef9af32f43db8
SHA51267e886a6907a5f6219ad316d852bac3db52529b69ebda6297362753331ba49c6056d8027835809419739339bcb29d4e0f1ae1a988fbf496ed023c1321810253d
-
Filesize
10KB
MD514ae59e31d4444240acad079eb7971e1
SHA1422ab1a30ea31d6610cfa0cfba2a4b30e2a40700
SHA256f42a1128d23bd45f7b48ff5525c80516ed912596a3638810e87114e6ecc36b65
SHA512bf7865ef50d6f8bfb5b7136991de4ab1a000f12afd1c627f63b6f77765fcc0dcaf61527791fbcd44db3aa595d114dc4fc2c1a2950c0fcc9d25fe02314231965a
-
Filesize
38B
MD552c6bac1e218ba93c57e81d9abc7008b
SHA1c0235a0c706774fc060134a8dde0cb45d1e326d9
SHA256ab14f22d88490617bb63b2565dcc34e0b20d78e378073b64d865dc97d68f3ddd
SHA512415548cc55d69ce31959f4d93d14de7d89febfc6d0c410e998678026fcc0514c2c3464e00f8b3d0d5aee9db5c5052a5a8ede333f90dcf0884166b95376157604