Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe
Resource
win10v2004-20241007-en
General
-
Target
08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe
-
Size
8.2MB
-
MD5
ae39ccf07901879ddd70cef55a543940
-
SHA1
0109a891b23cad06abe7723612c4152ea9f0f4d6
-
SHA256
08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144
-
SHA512
27b17be68b5da470d7ea031a09c36fe2f80adc5f7ea8c623848aa4f928e0b81ed375588c2ff33a33da289f50940ae95e759b7e0ed30f3cfd8aa597ff4e62719c
-
SSDEEP
98304:uXtBFGx2bmgtEXTE42ILZhx9WmKIoJhkX2+7uWgPGYOh8NbFPAQwDfWw08dGODaf:u9GJqmKIoX+7uPGYOeNlA7W38NDaW8N
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2340 08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe 2340 08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2340 08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe"C:\Users\Admin\AppData\Local\Temp\08299d90e6d6b1d94e47615093aaee9d3e51f3cf6ff761d3909df54a2a667144.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54a2fbc6563401f4a0ffd8c103ccd54b1
SHA180352a66512a10d6d7cc3cc41c05107407dad3ac
SHA2561bcd2bb78386b7a4d2dabc9f3b6ba09f5b81279f65c75cc716d93e0e27852cfd
SHA5122ce15f6cff0329ec2e12867b9308448b179aebbd4a3f4575b9766baa6d4570d9514f10790ee4954bd364aa5c44024557e6d1e00757a1d7ae6aec986c18d8a446
-
Filesize
38B
MD52b7f8c4e23f6404dae2361996ac732ba
SHA1222c90f8e38489e5a7041e74486ddbd2ebd81a48
SHA256eed7f9f9de7512957e25ec2977ed9f4af28f976a64dafb099f1eae555984081a
SHA512d4aad3666841ad4966c6815d12796152d309fd7f15aea05045a2038ba0d597c78ca00d348930b52775d2f3c2f12a0dfe844e076fd662a2c181585a1c68adc19e