Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe
Resource
win10v2004-20241007-en
General
-
Target
a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe
-
Size
1.1MB
-
MD5
22bb96e25c2cff7ef4b0571286e458a9
-
SHA1
9d01c09cc5d0347f1632466053891833c6db265b
-
SHA256
a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160
-
SHA512
94c524250f49c2aa786c80f88ae78a6b8702b0f18e061f8ec9d51f5e8caf551f6ddd19302dcfd1aca3e9073d8090283406493e5d058d68c3cf5780ecae82f4fd
-
SSDEEP
24576:g3ijXtmDOTle5RWGgHC0RiMScKdRQccH6n9Abugu:g0XtmqTI01HC0RiLcOjc6Abug
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1596 a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1596 a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe 1596 a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe"C:\Users\Admin\AppData\Local\Temp\a789571fe1090d394f3d694b1f5535032f29b1db1a385f93c72b80d0eb419160.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1596