Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 02:13

General

  • Target

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe

  • Size

    483KB

  • MD5

    c79d2fae260eb141b5abdef70699b2f7

  • SHA1

    3f4602c889b5a8da7a3899340913338610eb444d

  • SHA256

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae

  • SHA512

    4412d4a3eeef5d455a9111a9181551ba28812a70d9a31e9c80a3bb98182e68f8a6bd2b4f95f87b8d3e27b8300a4f8052b09a4d4010f8919437ceb00a7b60499e

  • SSDEEP

    6144:O5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrmA4:O5k+Yqaxrh3Nln+N52fIA4jbsvZzBA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe
    "C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Asus\Book.dat

    Filesize

    144B

    MD5

    b0c9bb305f7d9d48947e43ad23e0224e

    SHA1

    dca3a58d61477a591eb4c504b821f7f49b6c635a

    SHA256

    aeaba7a3adba733d3494b311e69d9f9d5f8fe3516c1024a80dd4651d34dc4752

    SHA512

    ce7371c6606ccdc57be905c08040b16c2c61f36f4bcddae74a7f12dbd73b26c4fc1415608b2c2c41987d5f913436bd308cdb36172a67e4d9fe4267bb491f3a2b