Analysis
-
max time kernel
90s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 07:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
CyberHackID.exe
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
CyberHackID.exe
-
Size
38KB
-
MD5
f8152d4dcf75d57ecbe18f3f80890442
-
SHA1
28a577e4a6a15d501aa17f1435fe82f5d971b3cd
-
SHA256
6658d3f7824f069c168b5a340b397d0fc44f7e3ea0812403a8978704c6ff23c4
-
SHA512
1f9883162d856281e7ccd56b41363103900f43478b1ea63244ce621630a8490242bb64c02e09da8c1938f264e1b405aadae992f56ed443a58ab04115b3c0d647
-
SSDEEP
768:zRsHfs5z8tinNqWyYn1+mBiCO4EMSmOg+Q9s:zRsQotiNqWyYwmBVO8Oq
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CyberHackID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 432 3248 CyberHackID.exe 86 PID 3248 wrote to memory of 432 3248 CyberHackID.exe 86 PID 3248 wrote to memory of 432 3248 CyberHackID.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\CyberHackID.exe"C:\Users\Admin\AppData\Local\Temp\CyberHackID.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:432
-