Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe
Resource
win10v2004-20241007-en
General
-
Target
9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe
-
Size
7.9MB
-
MD5
ab84280f6d135ec84688e770e29fff86
-
SHA1
9f1b645c0729b68b502d3e454fb754f8f2b6314f
-
SHA256
9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9
-
SHA512
5761940f20e255c9d7d7a71a5861d551f8ba01d644cc4dfc37c5bb5a1ee616d17f098ca6c9a926f9c907bb20429528072311352a18682c1e4592d0be8a82b2a9
-
SSDEEP
98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1292 9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe 1292 9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1292 9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe"C:\Users\Admin\AppData\Local\Temp\9bdcf8eff9c0954e1164c61d6f2f37ffa99596bebec61c57319c691912b5b1a9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD511d6af45a74d3ce55c8b0859ac9d5008
SHA14303f39b0780b6df2ddf320f1df462b5653f0f9f
SHA256272017bb06824b9a099483df48238afe45a85c049d3f9e0877345059783ff707
SHA5128351cb7a27f0b5c5179e1cea96da1e5f4fe20c6e60f063d89273b41dcedf0e5893610e6d7e819532ad536c4fafcb84ae4d5e3857108e8e12af6ea54c1d442c08
-
Filesize
38B
MD5e47dcc726dc6158f6e03cfafd202d315
SHA1269952b4a0868c2d8e9ca47a42b295ab589dcd44
SHA2567115e617eb810b5737ef4edea98b23155022843937c794d43da44e402f770a30
SHA512aa1d41fb0d78a48d19426356464bdda5ae5ba5051e20af1fb330a63d324a90b6888b93e0f3a780389dac9cb7e5f0f8be79228acb4f8d43a4cfac74c76bc14cd5