Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe
Resource
win10v2004-20241007-en
General
-
Target
6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe
-
Size
11.2MB
-
MD5
81d50b3752bc71f626fd2ffa8e518292
-
SHA1
fa76a247e02a22f19a81fc2824c8dd58e6ac887e
-
SHA256
6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b
-
SHA512
f4c3ee529f7eb95b1206abd0988bbfdab61973ac2c9f7a6d36a2f8e99358c9b3bb532f7954f14eb540fdd80517bc4fbba38ac5b7caea4e1680648cccfd87e8c3
-
SSDEEP
196608:FZNbH//TsH+O7ux4EFGqTbymw/RdyOw7xEwVGwbhZxRqK315:F6Cx4Ezfymw/R1wbXx/b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2148 6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe 2148 6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe"C:\Users\Admin\AppData\Local\Temp\6bf7f6f4fafae861c4f231992017ca4c42ed192862f06a4be41fa7ce08490c7b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2148