Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 02:09

General

  • Target

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe

  • Size

    483KB

  • MD5

    c79d2fae260eb141b5abdef70699b2f7

  • SHA1

    3f4602c889b5a8da7a3899340913338610eb444d

  • SHA256

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae

  • SHA512

    4412d4a3eeef5d455a9111a9181551ba28812a70d9a31e9c80a3bb98182e68f8a6bd2b4f95f87b8d3e27b8300a4f8052b09a4d4010f8919437ceb00a7b60499e

  • SSDEEP

    6144:O5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrmA4:O5k+Yqaxrh3Nln+N52fIA4jbsvZzBA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe
    "C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Asus\Book.dat

    Filesize

    144B

    MD5

    829fa4d8e1b15da91e85d465afdb5fa6

    SHA1

    ce5d2965f3127771873cf3921f0a99aef9778fd7

    SHA256

    adfdd311a7e1742208a601ce00bb36cc0f59c9201913ca4a1c26dd8736db939c

    SHA512

    16c88afa98650b1a51cd17faa1b8d080a0d40d93a1a8915eea218f804ed6f008ab701b9c6b4a3bc24669d64ad6512fb9d22461c4c3428de83243f6bd67d732b0