Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe
Resource
win10v2004-20241007-en
General
-
Target
fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe
-
Size
60KB
-
MD5
783ed47c9536daee6a6965cb3cffabd0
-
SHA1
caeddff47a0a21f5b17227626bf5897ac328f78c
-
SHA256
fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531
-
SHA512
901d02eca15d2a80e49899e3c923440113a12955a2079897e93d112e5768eae3c4ed8894f577c60a3ff7075d2fa87e7e2d41f499f734c8829494ea3872e9e688
-
SSDEEP
1536:/dU1lv7iP6zTNHYt6NiGqo3IBN+kmDW8Iv:+13yaT3Ix
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\PM000.INI fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2452 fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe"C:\Users\Admin\AppData\Local\Temp\fd12e2fc727eec5588cdf8b68fff8d8bbacd2adac1bc77c74f070abb809e0531.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452