Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10.exe
Resource
win7-20240903-en
General
-
Target
01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10.exe
-
Size
336KB
-
MD5
8bda0dfbf05dc0db1b820447438ac778
-
SHA1
7ec9fd74cfbc5c6dc39e9e4fdc64bbf8bf062338
-
SHA256
01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10
-
SHA512
b011ef6fbd0640cda0b5a733406be5a40b4b789ae4cb0eac7e3eee8afcc877ecbced609b9e3fe3db3bb2b6f2279e6a75352a81346942606d94fd4f3b9106aa45
-
SSDEEP
6144:Sr7hkh1eL5b+ZTTTBx+Dqn9iin9dgn9BvirtToOGtT4Px47:Sn/L8TTTBx+Dqn9iin9dgn9BvitGe5w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3004 01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10.exe"C:\Users\Admin\AppData\Local\Temp\01dd46fb38b8e257c3db90ad54888df8e3492c2a1733404f681a3c2a2b587a10.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3004