Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 02:43
Behavioral task
behavioral1
Sample
88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe
Resource
win10v2004-20241007-en
General
-
Target
88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe
-
Size
481KB
-
MD5
636e91c12e393d1ea1d07c9970de9cf7
-
SHA1
9b4d1af92501bda15857bc286aad9a40e918259a
-
SHA256
88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0
-
SHA512
58ec575c6f2da8d76ecefd4df76bae19fa0c1b8b073ac5d93d099d383901e8b48e85e11de36a62861b18c9348cb671cfaaafe6136462fd7d5469720cf2205896
-
SSDEEP
12288:/9PgP3HAMwIGjY4vce6lnBthn5HSRVMf139F5woxr+IwtHwBtFhCsvZD5x+P32:d43HfwIGYMcn5PJrZj+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3440 88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe"C:\Users\Admin\AppData\Local\Temp\88058b77035a018b3582136f073a1fc44eee203786b76890b53ca22c090ae5d0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD554396b1f2f287d354fb00e1ddb93e5c0
SHA1c7c96eecd53d4b1d8b18ea89a00f6cd3a2e55702
SHA25613fde60037e6ae0ad5eadd10794d58e72bad6e9782d2fc47ab6691b4c1627475
SHA512b4893a5d2de1e04164163641d0a78903ef705cfa8c33bc7b8530c2f876c72243e5ec75ba550f744200506c2f174cbdcea911c450771097ff62aa06bc2cdf8bb5