Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe
Resource
win10v2004-20241007-en
General
-
Target
47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe
-
Size
11.3MB
-
MD5
27a48526ed77894b1baba77bc78ab7a8
-
SHA1
e5e7f8764616f0541fc7bbf3d5ebcf3cbf6d0165
-
SHA256
47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c
-
SHA512
fee891ed36f6787d7268331dfd793340e109a2988cc22693a5013af890840d5b01bbc6d3760bd20942dc088d4c716fd268ffe05b425dc3ac194a6d0db6297468
-
SSDEEP
196608:RXFGPpySVf+6b9oDdh0qTRxa8z1sULDSe9a+5crvT9YqS4lU4I4:RXVuf+6poDjBTRxa8psYSUa+arvSP0z
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1864 47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe 1864 47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1864 47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe"C:\Users\Admin\AppData\Local\Temp\47dd60bbfdc2b5720615a21d65ca18d4eb08fd6efec39fc9a75f7bbf5a39cf2c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD53675e532ff5792c0e573de491a0aa034
SHA189ebe270a4e46314b57ed8d45adfea694bb0cc7d
SHA2568c1ee84ca804350b12c1261cb40adb3cd3080914c896189488665a1ac3f345a2
SHA51298f8c5dc4b60e4946363c5d62b7eb6c7493cd7c387b33546ddc067887b46d108327cb67fe64dc8780d9dc99347abf63128645bc4b048114f73b7bdb9cdb9a094
-
Filesize
38B
MD5196a114009493fc23e46439790b2272b
SHA1dbb71982d8e5f5045b1fbbd64a5dcc4943e1d4a0
SHA2565bc3f4803729cf6216d4690a66865261b526eb2526e319ed057a50fe3db95f60
SHA512cc8c070173da35e9ef42e247681a08ec44024dbfccc049f96bd8afb1862497a5e3a6f658a63c1e1465fa68b339fcb304acb7281c4a4912a338c74a396db633b0