Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe
Resource
win10v2004-20241007-en
General
-
Target
6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe
-
Size
7.9MB
-
MD5
6d2d59a69c0e3e8ec0507d66b15e5d55
-
SHA1
7ac8e562f54e9eade403b44f23a0550c5f1d6360
-
SHA256
6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e
-
SHA512
3abf36a8de832de046eb960327c2ed06a6e7ff6a4b89999d3f103edf10ff4c6b2a3a7aeabd56d86095babf82ab308a8768eb6299662b57f9db08f7d9fac036e7
-
SSDEEP
98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2120 6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe 2120 6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2120 6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe"C:\Users\Admin\AppData\Local\Temp\6e32636ee6b41e82ff471c0526ff26facebc77c6dd4b357940687377f0f95b1e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55194ade3eb1027f9197afef8fb7f1357
SHA13cfb949300bdb863b48ecb13a2d306abee9f37b5
SHA25685cd4d9ce651ce5f995a77f6dc050f21c538aa6cc0bbdec71e9c203b465cedd1
SHA512e2128408f6f1a16ccc15253e5e587f1720daa895361d351c33af0d01b67f183eeef1fd4fe011e53b1f1e72220dd118c0f4e60bfd74b8233bfe5265bf7c2f1a0a
-
Filesize
7KB
MD56053583f1cbeef42c9c575daf30bc4ae
SHA17684464524c9fab9c5f9d8148356137c5aee1375
SHA25684666a309d222fcc54c5fcbba1f689fb1cfd81551b35217a309017b061ebcb4e
SHA5125969202fddbe5b38a482e3c8a41e48228fc6fadce784a2cfe37e203254c8cddfcd3220b17c090e2d572cbaf52fa29e70440cc42f9115937c0adfc78e8a7fafd5
-
Filesize
38B
MD57800db461e9291a2acdb33de7510e169
SHA14b93b912179e8160a8dfdb47b1267ebcdfc9d88b
SHA25616f084209120767a3777e5cb2b7b31161d326661f3d7741e4a30815ecd8ab7e1
SHA512c06560965f16d8a6a2759073120f41bb1e9e2819e465e8dc0ea554d72b65c7de98b1c5cdd2f92c9c71a814db55fba5f977af1a3a40ffdca843ab9a12f7b33143