Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:57
Behavioral task
behavioral1
Sample
fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe
Resource
win10v2004-20241007-en
General
-
Target
fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe
-
Size
483KB
-
MD5
0a5ef4ce865711c55bbd9e3ba61bcd4f
-
SHA1
af23d89a402faaf366a0374a24dcd5844b386d62
-
SHA256
fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358
-
SHA512
f79a23f44518c1fb363264fa5bde787ba44d80bff1af7464f2f515ef9b45aa4774f13ae4dc5440fa15918db3c9224183a1b12d2731059dec1f2b85640f0f8030
-
SSDEEP
12288:W5k+Yqaxrh3Nln+N52fIA4jbsvZzFVA4:gY9xrh3NDfIA4jOZx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 436 fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe"C:\Users\Admin\AppData\Local\Temp\fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5dc2d6992d32ea6f152a8d3f8603cf6d2
SHA1db148464877d40591d4bed38432ae42e130642dd
SHA256b8d13442fdc864d98bf76b0f63f25d25e334c26d9bbb3f5e46b3e3f174c46d29
SHA512c023d27a059e1f2c112a15d0943904f041009fe889fdcf3c6c6d963cfe9869a16277f65ba88f84d7c06b4a696772934365735322c4a4670094a53b49913505b8