Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 03:04
Behavioral task
behavioral1
Sample
b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe
Resource
win10v2004-20241007-en
General
-
Target
b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe
-
Size
483KB
-
MD5
cb32d88e0b49d1db4622373001e2d753
-
SHA1
bd81a5636f7c35ad2a3a5207320dc6f8486f310d
-
SHA256
b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39
-
SHA512
25a10f0628b3510c7149f63397bdf889fd768df8bb1f60547d00223c0dcf56b489cbcd5e4b863846bc8f0be8c3fe1865bb5972e75fdb1b7d66d9cab7401730c7
-
SSDEEP
6144:cXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZsAX4cNf5Gv:cX7tPMK8ctGe4Dzl4h2QnuPs/ZsScv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 760 b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe"C:\Users\Admin\AppData\Local\Temp\b1ca571f365a1bbb855d967b78109d6744f79c21f7d81729091a1ba2ea6cda39.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d4070c8cf08cd95dcfbfb74e964062eb
SHA1dccaf141194860357b36c38582db7ec48d0ce303
SHA256310474914b25dc504423cb174d8eddfb134e6cc3d1e9a76b1c3d05771e085671
SHA512b5e0e3d63c5cd538ff5b48d04802bb21a298dc086dde1b3a67943c1227d8625a2a7a77a403de176ee6e4d6a544d174998a1b73585b7b8a2bfb9e981afa0f7391