Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 05:23
Behavioral task
behavioral1
Sample
d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe
Resource
win10v2004-20241007-en
General
-
Target
d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe
-
Size
481KB
-
MD5
4a17a8d2df7c866fbd37655a20223bce
-
SHA1
c8f9a96c5d190ff85387e21ad1a718f7893ae622
-
SHA256
d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c
-
SHA512
07c2b3110806b9220cac20bff8b7406ee62dc19b0beea4c597562a22f87d9b1e0798106f2ef87f8aa1222b512a0bbec63cdd6e21edf8144f2f5f5c446424629e
-
SSDEEP
12288:ruD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDS1+DY:u09AfNIEYsunZvZ19ZGs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe"C:\Users\Admin\AppData\Local\Temp\d5ab553077edb632186fae2823dc664396267b4d40ac6fae4d27569be21bf03c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58613f2ad02730b212066515f9f7169c7
SHA1e7d31d18bc933d60016de022558c6ef220116a42
SHA25678c3b4411028eb3bfc6d828cf80539a615bb15a320c3d598b9878e492b3add6a
SHA512c76bb3c636cde13f013c8a61f9f2ac16bb25aecfd3d2ddbf3fb95efe7f5f55bd39d528c1f189500d5f7a92e99035a7b50988e719568808b140bf430be9130b78