Analysis
-
max time kernel
77s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 03:01
Behavioral task
behavioral1
Sample
e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe
Resource
win10v2004-20241007-en
General
-
Target
e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe
-
Size
130KB
-
MD5
2219f32a21cd4eef306a59842e6309a9
-
SHA1
571f541dea18e6ea5ac8041685111ab6ed2d8c61
-
SHA256
e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6
-
SHA512
0f3f35ccce045143be9c083a0783c801c2467afeb54e4d362a5bedd96f6280846ab9482df8edbcd24048c86d61f7b5cf5027591a775080848204cb2529ecb196
-
SSDEEP
1536:eH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmZr:SKQJcinxphkG5Q6GdpIOkJHhKRyOXKR
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1780-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1780-66-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1780-75-0x0000000000400000-0x0000000000423000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exepid Process 1780 e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe"C:\Users\Admin\AppData\Local\Temp\e01e70ac2a30ab025b2fd847e081803df0d6211b2fba732f33f07c8f28b479f6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1780