Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 02:13

General

  • Target

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe

  • Size

    483KB

  • MD5

    c79d2fae260eb141b5abdef70699b2f7

  • SHA1

    3f4602c889b5a8da7a3899340913338610eb444d

  • SHA256

    39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae

  • SHA512

    4412d4a3eeef5d455a9111a9181551ba28812a70d9a31e9c80a3bb98182e68f8a6bd2b4f95f87b8d3e27b8300a4f8052b09a4d4010f8919437ceb00a7b60499e

  • SSDEEP

    6144:O5zY+w1LqZBCxKedv//NEUn+N5hkf/0TE7RvIZ/jbsAORZzAXMcrmA4:O5k+Yqaxrh3Nln+N52fIA4jbsvZzBA4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe
    "C:\Users\Admin\AppData\Local\Temp\39f13c40aa478d6c1d0523d2710ae9144162054f0b754f8af151fea3b3bbfcae.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Asus\Book.dat

    Filesize

    144B

    MD5

    5bbc08d50a280c084f674380d919be3c

    SHA1

    5a8e400ea94e3e74a201c3fd75215e4274a35534

    SHA256

    75d65d5f053d8225b19f8d162999393c8923d6d7cea19a53980b550f489a43d3

    SHA512

    bfe4800248e1e55b0e91f0bea80e507d10bedf5eb505a0162dd748f3a39bd26372152139e46df5f834f98582797be1ec76e2f524fda391cd5a9e830cd2500ea2