Analysis
-
max time kernel
95s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe
Resource
win10v2004-20241007-en
General
-
Target
7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe
-
Size
7.9MB
-
MD5
bbb62a03b61725e5e2994f32bbf4c5c8
-
SHA1
b94490144b1bd0a0208ab2e3a402e891fbe1e050
-
SHA256
7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693
-
SHA512
a28815692255fc9b4a2b090e588903cf4af54b8c47c9235e696ff02f1cfd6e6482711dc3960fe814ef07465a4eba306e8808ce0aec78c67ba1ee0524f4d965fd
-
SSDEEP
98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4776 7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe"C:\Users\Admin\AppData\Local\Temp\7b796895be0123e6e8507ce865c6d60d95f3348206a5fd1abbadcc6a73302693.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55663803ba9c51a999fff8025fb68ec9b
SHA18dd04ee34e3c08a0d11b1da092b3e2f9c780aa56
SHA256c74e3fa9b8ae059bf6f45e9a177be7457d8ef511c1bf54393e53459e876ba183
SHA5129f77fbd2474a433246674a370bff5cf2c9e5098aa9d38c54c7518384c02a12e549b450601ec92a40e7ad9558ab64ac3c5c1f2651f35c410039f4258737961d5e
-
Filesize
7KB
MD580f0cddad47754ba69b2e2adbe2474ac
SHA1123bc5f0fb910ba00578f13ae742cee4b6fc4079
SHA256c35d0c397b0a4d5b772cfb7ce5340970adfafb74339dca384fc8a78ca88932ce
SHA512bb2f1b63732fd84c505f0176a64a361e0d910532aa6931a0eb5977a1b775182723ffa1a695c6724cdf5a7fc1bf14f6602bc26f85394b825f7194185b8ba79f6c
-
Filesize
38B
MD5df255ec6c21677ee002054352c972b0d
SHA15c80ed6813935cc258ad6364033d86080efbc5c5
SHA256f1f47d0cc3602a530bbb200b7fc961b6272a5e486e80e805213130f75331fb00
SHA512459190b998a891cd90f3d3b566420e38c4d5027885c09808c33295cdd6815b910d1a68f3765009e9918386dffacd8d2c6bd7ad9f5542a2113807075a3a29555a