Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 02:10
Behavioral task
behavioral1
Sample
1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe
Resource
win10v2004-20241007-en
General
-
Target
1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe
-
Size
481KB
-
MD5
2b2449e65ec9cd99f537fb5b936f4dc1
-
SHA1
59e3d847c809d62b6fc854adca1ca6e781946e60
-
SHA256
1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00
-
SHA512
029dc4ee0eb0576ac983480cfb54d1eec5461347ab8b08357c64d7fc425af114e89908f4710b4fcd1ec3afc642a6ca6d9eab24744c8189756769cd0baaa30bf6
-
SSDEEP
12288:nuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSS+DY:a09AfNIEYsunZvZ19Zxs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2196 1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe"C:\Users\Admin\AppData\Local\Temp\1420aa908caddc9d320757e24efda5a971c717334ea88a194366c114ebbede00.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5199c7f10b36c5a905b845cb2a90c5316
SHA1265d53283b83532679eae786ddb29f8c6a5b8fb2
SHA256c7ef896b0d0f1d30d234665113aa7c2954bb71c6ca0051e8a39d5cb5c1de0605
SHA512b8e6ba611904f30ed3bda024358dee6579525cc4ef0d9bc0f6a437cf231c41c6d35164a9e32bca8af0f1cdb3fe47fe5f526e99d8be002b101847b0778c5d3e6b