Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe
Resource
win10v2004-20241007-en
General
-
Target
6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe
-
Size
7.9MB
-
MD5
e8602f2cf9b83cacacf4f8e11d364ac7
-
SHA1
c7efffc95747eec45b53f20091d4f3ef14e82fc5
-
SHA256
6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f
-
SHA512
9335fa0e93d546aab2aa7296cf4249a7ba17d9df4eb455205775cf6f486f8470fe9e2a375b5a176b849414dc6367895f4e2e60b0f97c1b96c605107719b39c4e
-
SSDEEP
98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2112 6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe 2112 6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2112 6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe"C:\Users\Admin\AppData\Local\Temp\6e90cb395826e61fe44dbad345b9e49b92ff2acda5766e1f360dab0df8649d9f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f7d7f89ac3cb3c9ca0dc3ebac628c0c5
SHA1751c6c22d2c651d8328a2d4f85d7e1e208621c98
SHA256b17fbbad0f84117b14c69970eadb626eac3368fad56a4ac1d74d5bcddcdcef42
SHA512895fad07c6f7191ec9e5b56f70ae64f75c18151f8f3d7167365bc4c8239435b139090ac8b957bfdf06ebe829a8d42cc21cd1297174fff69efae828d3dc3c8723
-
Filesize
38B
MD57c267a640d396d2a854ad2d4b01e515a
SHA1c4a4698820154d11ab715efa060c810284a89c60
SHA2560207dbd692218e653238283b8e924639c4e3f1d8c60b12b92f9b4ec7f2be3fd7
SHA51274304392316c535be466d6efbccc77360978bb1db211520a1ad1ae9f51eb8a4853662ee407d904c32ca13ac07e34b7644caf8a25b1bc3852e09f8885d6d33b9d