Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 10:08
Behavioral task
behavioral1
Sample
ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f.exe
-
Size
199KB
-
MD5
1e82db1fc99c223748475ed2d4fa300a
-
SHA1
c06426c3a8a815e714166145fcd9e7f063a3f9ca
-
SHA256
ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f
-
SHA512
6b335d967b99b26c624cb3f581719d350e43b208dd926d9300f4489289fec1a8f34bcb24042339d7565f4bd4d1bf73e6a93224abd52098448f88c0697398a09d
-
SSDEEP
3072:SctbTf75ImMEPrTxH1/Y7yEUktNr3eRyozQ9AiQ8:SctjGmMs7/Y+PUruRyd9AO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1020-1-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral2/memory/1020-0-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral2/memory/1020-2-0x0000000010000000-0x0000000010018000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1020 ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f.exe"C:\Users\Admin\AppData\Local\Temp\ca5d29c1afe48f42f4957b7e159e91753829782e8730bf1be33c2676be82741f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1020