Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe
Resource
win10v2004-20241007-en
General
-
Target
27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe
-
Size
1.6MB
-
MD5
06b9e99c24264bb399162b66ff5387dc
-
SHA1
f08a2f1f716fa2aea35c9a34744982e659250950
-
SHA256
27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0
-
SHA512
5a26d86223508b93b1b785cf8fe98cf576be164b2382ee1830494981686b0c0d132e81be56b2aca8f45f58c71bfdc63c7b5c09e33c6bcc3704d1e5e378f416d6
-
SSDEEP
24576:2R6lDztDUx9s0YycEXI5Lbdh7WklC9JYZNn6v:2R6lxMkdh7xCeZ6v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe 2316 27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe"C:\Users\Admin\AppData\Local\Temp\27493dad198cf4f0fc047d49d9b664cd74f4ce0f9308546821424f74fc39c9a0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2316