Analysis
-
max time kernel
95s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe
Resource
win10v2004-20241007-en
General
-
Target
68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe
-
Size
7.9MB
-
MD5
e9953952c873b47cff46adcaa7e9ae21
-
SHA1
168a1e4d936bc8b369ec2690ad93d8678e43736c
-
SHA256
68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0
-
SHA512
7741f0cae05e4bd190eda4398afe60ba9a86ad633ae59d0f473d3b4e68a0ed4fd7facd6cd255c48c0cb03075a7d2a51be232809c68cd1a5901b760b5ac92d4fe
-
SSDEEP
98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4716 68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe"C:\Users\Admin\AppData\Local\Temp\68adc3df41a4893895603457d202b26f5de7178da1c9263ea56715e35e1f75a0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bd02681a47dfd3510d7f54c75b3c4e29
SHA123d382068d767f49d2b22743430849d126d7edce
SHA256bea9ebac14cdde74783af7d98588cfdb605f862cbfe6806775108901f60291ec
SHA512f3793065851ab42d2e689e0dd95f42f4e5d4b087942b0cc74d03f0f3c5f1da28c2ef13096503ec295d0e03c45d2d75879445b1fb617a583d21cfd0c24527ac96
-
Filesize
6KB
MD51944215a7e8bd0f7d582ab252afb30c0
SHA14f520c9c9b4732ef45637b6915318241ae16cfb1
SHA25640d79b4d6c8adc415c884da52bd32a5f23ae2b71bfcac8601ce1b07f42dcade5
SHA512d6c95021a7e81ff1987d51714041c10c81a7ce06297c1aa5e5036a98692d988dfd9e922458875f398a009a52109822625cefe22a3de82048d5deb3b1be57bb50
-
Filesize
38B
MD55bd3aad64d1ce4055810555ae5a575b1
SHA1ccbe05af30ff134877c8815335a7f66e67b3a2a6
SHA2566d76cc62a77b64bb10969bbd729a70678ac962d8687a68e414868d09ee6a215e
SHA5125faa5996be7f78e68bb743a1fc681efefa1b9cc2cfbb6ca8aa137ccdbcec5e83a85e83434bf041c47e34151892e1d7045e20ca487f8880bd23e7682ab7ddd0d7