Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe
Resource
win10v2004-20241007-en
General
-
Target
25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe
-
Size
973KB
-
MD5
00d4f2b3416a799c4f36129628458a10
-
SHA1
2c14cf27d232a4a98777520953c35f3156de944d
-
SHA256
25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd
-
SHA512
e1b60d9c86edbaef816df20499a8447e538f995427e9bcc11997d4d3bdf84b9ac8e85759da4e3e1dd9668ab3ddf199d0df4d034a5e95da488b142e2cb23feff2
-
SSDEEP
12288:cFUNDaWzONvMk17hBelz3l9trOGl7mpSOz3l9trOGl7mpSNwt:cFOaZhBepFdl7byFdl7bGt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe 3076 25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe"C:\Users\Admin\AppData\Local\Temp\25f4889352afb447ce27ff2d0640a8cc462a65cdb1f2a9185120770ce8f21ddd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3076