Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 03:13
Behavioral task
behavioral1
Sample
f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe
Resource
win10v2004-20241007-en
General
-
Target
f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe
-
Size
481KB
-
MD5
814b050fa0fef363a44518840b84846f
-
SHA1
629d19678ee6b3ff85b0ae361e24c31bf9fbb568
-
SHA256
f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950
-
SHA512
9b9829a575d8ef0dc89f25ef7082d1c73806f9e7a6cbef76d7ee749ec2273ba7d7ad8be8c7f87caf6691ec159f4b85580edc53ef4aac867316e717fd89259955
-
SSDEEP
12288:NuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSR+DY:A09AfNIEYsunZvZ19Zqs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1924 f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe"C:\Users\Admin\AppData\Local\Temp\f577afbcb05a47c037abb081c6146d620b4ec9b428988e235dc10fa0f5665950.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD59938e89030df2086b0d6fb23596a95ac
SHA1db52b6a506ca01e7a8eb9138d8b8e222c885f9c9
SHA256c8f043637f4f93664d890ead35dd8d24add3d33d11371d9f0f79cd0f2ebe9262
SHA5126525e3a991d373c4a599092cfda19bbab4f4d1363ae9706aec18fb29c391b02e783ef4c8fc02ba82d487e87e1a3c2ce7c8b0be578e96a06735fd02a794a5f443