Analysis
-
max time kernel
97s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:23
Behavioral task
behavioral1
Sample
ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe
Resource
win10v2004-20241007-en
General
-
Target
ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe
-
Size
130KB
-
MD5
e3178f2d10479f6cf74d5f9e33ca62d0
-
SHA1
9fd124534673f302d770c11c7c06e34d1d1ef01a
-
SHA256
ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51
-
SHA512
c5a2e3ee7766bdc2039cf065c964bb12e21ef93218acdbce5ef525fa0a210229a96674ca6b4bb55865c99057b09586811e331b61469da412d22f7bef09df4a29
-
SSDEEP
1536:mH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmNJo:6KQJcinxphkG5Q6GdpIOkJHhKRyOXKo
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/572-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/572-3-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/572-59-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/572-98-0x0000000000400000-0x0000000000423000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 572 ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe"C:\Users\Admin\AppData\Local\Temp\ba165096ada43a53db9440cf1aa23599c7978d729f46f0ad81797988596f6b51N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:572