Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe
Resource
win10v2004-20241007-en
General
-
Target
4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe
-
Size
10.3MB
-
MD5
4c99202be8c34b4e478257accd22fc5e
-
SHA1
0c1bcb4da73394585f1af8002a9fbf9bc7dd8a46
-
SHA256
4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7
-
SHA512
82bdd3cb58e771f132889b9a4958209890803f4463fd016e895c1b2971607ddc1c719993270901bf5572e731e8cb4fe62510b5764bda87767031bf7f22bd4fde
-
SSDEEP
196608:dXHSVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:dXHuf+6poDjBTRxa8psYSUa+arvSP0z
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2720 4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe 2720 4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe"C:\Users\Admin\AppData\Local\Temp\4cb2817a68a120cb9f8ec66d8670505fafb9c8b5225f68cd03210140f3d063e7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c02500d571e7eac5a243d268783e167c
SHA1580893edbd1c085ae7e6201fc2d1ebd34c4bc0c1
SHA2566df7fe4c330011b80d84a1007a3c2050d932323a13d367ebf5756dbc2ad3096a
SHA5123ffd81ffd30f8f5a750cb7e22bdc194fb52949f02383488803031888cf4dc5e596b66a1a1f8a740ec50389ea11cc34a1c7319ca04c8f67ef63ec93e59b092678
-
Filesize
2KB
MD5bce1a1c5cb14d75863904f216fcd9ccf
SHA1df9964e840cf3a8a3d353e8ccd5d979ad2e05f2b
SHA256716f276d3d779d6e1b80b6fcff8f49eb4d31bc58748caecb93e00eafe822a639
SHA512a2c974ed19ccaf9a25b8eb7e2bea6f1498c7ec90d3936bb2610d0d5cbec86d25a49c33f44396a2b149383dfc95ec030937557877babd13586dd1d2016aa7ee47
-
Filesize
38B
MD5d31f01134d1b76b33626ce53301ff4ed
SHA18074d752f5a47bec494865315183bbfce1910d05
SHA2562f24d3d5ce7859b56a4a1afe783747c658f6f6aed084340abc2cf80e92d7be7c
SHA512cc7652895c2ea38a6374407605bcd3b72328402f37143dd1333d1ccf2ba25f46d1947ffbe3666fe0ebc82c0e4caa1dc6ea6f6e923b906dbb791f7668f9f564be