Analysis
-
max time kernel
96s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe
Resource
win10v2004-20241007-en
General
-
Target
70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe
-
Size
8.9MB
-
MD5
ffaffd5e5b02901863a2de489edb167d
-
SHA1
728420f4950c2383a6b257a0bd4d578ae664e203
-
SHA256
70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec
-
SHA512
7cb0290e9690106600566c8358d6b12e50f8cd4409cd5801e674e9994f7ddb995a06690f4507cd5ff0a3095f75f663c22ad7dfe428a7a4b0e1e3f32ca492a11e
-
SSDEEP
196608:ZYPRWWv9RZ24NTx9Pe20/zkOiu1f+79YRCk:ZYPRWUjQGdCzkOiaf+JYRC
Malware Config
Signatures
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exepid process 3128 70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe"C:\Users\Admin\AppData\Local\Temp\70997d3b29335f157e016d009ba9da2a9f5dc0b9e1808673cdecacba84da69ec.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d1e4a0ae88fce602708ed7cd0c24938
SHA1b6cfe28bc03e5aabac72dd0f734b1cc01d81766a
SHA2564602bc8df1d345e87248071b8a6821d5b13140fed1e8e8d27815089db2c3b3c1
SHA512acbaa13e1e7521d6501740c811f1432446663d4fbed38cea12e93a2a2341e2d83f9fd51b3d1cafaa734d5746eeefdf93cba8fa67bb197ded8b9f404a6db78d2a
-
Filesize
8KB
MD5efa17fad8d3b434ad64c633dbf4e0973
SHA1805c0a86272b0e0ba92025298d8c1e66c22a2468
SHA256192229d00b8c176611c75b524633d2bcce919dee2b42f5335672b99601e2bdae
SHA5126f05f1f4bfff379059bc950886e8eb3d3bbc39f274d52fc8575d2a99547dba07bccf1d1823aa4b9e0a36509ceb54e0c6a0e6311fcfc8b8a769959855e46ead93
-
Filesize
38B
MD547e69aa9a8cad23b0c3efa442a7ee0f9
SHA15d33027268cc151f60024e590aff235ca464355c
SHA2565d6c4421650d347d99000d0a87c690a39e155a0a63d92525a8dcac461f4f29aa
SHA512ef602654adb43bce1af49ffb01fc88f8caa6ba8a39929089f003f6f4d0bd04f403a63308326e04bd028d1b1d9914ddf0dae2670c8aa6d3e65c4405c5345214d2