Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 02:09

General

  • Target

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe

  • Size

    483KB

  • MD5

    c79d2fae260eb141b5abdef70699b2f7

  • SHA1

    3f4602c889b5a8da7a3899340913338610eb444d

  • SHA256

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae

  • SHA512

    4412d4a3eeef5d455a9111a9181551ba28812a70d9a31e9c80a3bb98182e68f8a6bd2b4f95f87b8d3e27b8300a4f8052b09a4d4010f8919437ceb00a7b60499e

  • SSDEEP

    6144:O5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrmA4:O5k+Yqaxrh3Nln+N52fIA4jbsvZzBA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe
    "C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Asus\Book.dat

    Filesize

    144B

    MD5

    69fc2eef593dfe3d59e2335699e7c732

    SHA1

    04b69b7a4c2fc8f1f975deb4b0778b85fcd898ae

    SHA256

    a3e68f5a66e027c352885127ac1c75fe892166f4ccdb57f02379f3c079dcf043

    SHA512

    2b192f79c10b2daa4abe7d0ae49614c7a26522a201f370fc58cc0ca774b4663c87d8dd3587d6adb6cc5ff0d0ed867aea67ebda08122e6aa8a4a8f9e7b12f0f0c