Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/11/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe
Resource
win10v2004-20241007-en
General
-
Target
ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe
-
Size
468KB
-
MD5
d0fcb015ad8b57d1caf32e4517613566
-
SHA1
638f4a420993204f559bb2cec2bb4df927ddb164
-
SHA256
ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24
-
SHA512
5f97ca47b95e8f98b647e8057de0462d659c2efb11f0cba2dd8e74ef8d3d1e8e3a9f2f143f1bef33e3f48713eb37d7c79d5797e91a61b525db62028faaef0a3a
-
SSDEEP
3072:mbelogxaIU57tbY7PzTImbfD/n2UnsIHzQmyeQVZrf4fknibuxGlS:mb4oCc7tQPvImbf6a52f4sibux
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe"C:\Users\Admin\AppData\Local\Temp\ebf22e9cb04198e9aeb47fef022bf8229474034244381946c6677aed396ffe24.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD566b04dd84ad02c9ba00fc21e80647806
SHA12896641c8e6aad11b78d7bbd13c2165a3a75e2bf
SHA256d4182e291156f687f25610d7e8cddc2d9c013c1eec391680cecdd6c094f87ea8
SHA5120664fa7cf5681074d24441c5a070d552edeb85437797e50a69b359bf3b284e6324818de38a90eb9e73bcf0247702b539fd987c95a9ae2d9e9f51633eace1e3bb