Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exe
Resource
win7-20241010-en
General
-
Target
78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exe
-
Size
336KB
-
MD5
10634418af874b3b13b3a45b0bc12e0e
-
SHA1
c5a0d0061318ca63c98e8963b1a959407f447330
-
SHA256
78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704
-
SHA512
088cd111069cf8f3f848243eb199d588e1f8ac1b446fbdf4d57cdd85b89264f815ff6eb1231dee91e4d5a9dbc6ad9afcd977b3b238847c3553ab41b67ca524f2
-
SSDEEP
6144:Sr7hkhieL5b+ZTTTBx+Dqn9iin9dgn9BvirtTokDqHEPIzE/:SnOL8TTTBx+Dqn9iin9dgn9Bvifqkp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exepid Process 2568 78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exe"C:\Users\Admin\AppData\Local\Temp\78af31167f66cbb7bfb2540229939e3f9fdc7bc645b2cbf7dead5275bd7f5704.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568