Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe
Resource
win10v2004-20241007-en
General
-
Target
4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe
-
Size
984KB
-
MD5
4d29f6d3ea4133382193e1e2a9d476eb
-
SHA1
068daf075b5f4d5a3ae3310afc5ebe815011feea
-
SHA256
4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0
-
SHA512
8dba352d749da1cf6470dd597ac05591eaa342da1f67f6f575c9c7dcb480ba687c7fa0fc8b52f527ff5c2a0d6878e09986cd4b7c78b90c1f9e0044a79ce4494c
-
SSDEEP
24576:H7EcX50Kew+IVWQPYwKBdzuyMrhFvJI4HB:HtP+DwKnwhF5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 212 4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe 212 4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe"C:\Users\Admin\AppData\Local\Temp\4abbe4b15b6be371445b330b3b30b9b78651258944f770932ec7a9bb92fb47f0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:212