Analysis
-
max time kernel
94s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe
Resource
win10v2004-20241007-en
General
-
Target
909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe
-
Size
7.9MB
-
MD5
a2cacd3811a35adf27cfa11b42f2661a
-
SHA1
3e5f4674ab8fb0acf9d7ae7659af8d1a13ff85a9
-
SHA256
909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25
-
SHA512
2318aad8d438b76e27e82b2d85746a72f09859c9f1e6bb93e485fcf2d60bb309f2762665faf5c2458e5ea0c1cda3715b768d45bbe437d6bb10e69be8c01f1c92
-
SSDEEP
98304:Xg49ZaYwsmJdj9PfPHRCjNTEY9xFUkcVwNSHfbv/kOIhThw6Q1f+hl/hjY4+iafD:XgP34NTx9Pe20/zkOiu1f+79YRck
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5068 909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe"C:\Users\Admin\AppData\Local\Temp\909349d8ca20ea7d8b71eb115a8057e86ea7a57c46081807d7f1ffa633293b25.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e85f212d4b955211fc7bf1b186bfbc57
SHA1e7a026bb114b3b8d97b613534bf2523ad72f3161
SHA2565faed5a4e26389ba3cee52b76fd819595c4a086658b48a8d57d4667471667a3e
SHA51200aaef4e1fe73c6306bb4c4ff0121f88d11b5ffcbb7633fb994fc52f31e0a9da5a0a5b29f0c5ba67476927536302aea364ac7002a2ee60ecb034886a5068599d
-
Filesize
7KB
MD54c67ce361d930719a8633ce6f360a2c3
SHA1374220b7d8370946d902456f4dfabecae8bc6a42
SHA25647136b8d32754a3224a47ae1e9d31c822b5a730cd502a41f642f85449714ba31
SHA512aed5c43675d96521041781a1d8ebc5dcbfc5a40d67c41c1bbe1bbf44847e10f7ffe8f388fb1b926b2c81eb067860b8349d7c42300b7c7c96bd81a39d600354d4
-
Filesize
38B
MD5b02b0d3d9e6715ce8949937762007297
SHA19fb477e85128c7993db6fb042efa090fc9de4d2c
SHA25686183553e811bd1a45f661cd50765212d75353fb863244c24db8d490efaef8cb
SHA512eace029b4091329a30cd8cda0495320d7254e98603b87c6bd74a277df9b70f16d10551311bd236d07d1a9ecafaa49a34b2f29f569d503900c6e278e47ac54dc0