Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848.exe
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848.exe
-
Size
336KB
-
MD5
847251e070b8c049df901c813f8e785b
-
SHA1
a7905f9a1d945bfcb86c16c88c15d786d355e76c
-
SHA256
228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848
-
SHA512
3fd930f8e81dcb9fafd7253fe14ed784401a80682af211b616f1a44f8778f5cd411940536f1502bd2bea9e8e89928e416081adcd0340345ff7b6f0d63fe91812
-
SSDEEP
6144:er7hkhaeL5b+ZTTTBx+Dqn9iin9dgn9BvortTo5+NTb:enGL8TTTBx+Dqn9iin9dgn9BvonNTb
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2824 228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848.exe"C:\Users\Admin\AppData\Local\Temp\228bed7efe5f2644971a67f77bd55919ba6801a299b524a59ab79f69bb117848.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824