Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 06:51

General

  • Target

    451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe

  • Size

    992KB

  • MD5

    91013321a2adb3f74a4cd2963526c6c7

  • SHA1

    bc407f2bb36876b94ca84df8c95eceadb0269c57

  • SHA256

    451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68

  • SHA512

    55f30b66b9252b79f8df81693d08396457c8861bf78a5e6e365e42e51b43701335244b24deb1108d3922b94e5ffa45df8469c1f5acb6444252550530c6ba6263

  • SSDEEP

    24576:K6mKfjqbsU5rcANm50kz1VaoUSbgaCsPd/:K6mejeCCOn14oUuL1Pd/

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe
    "C:\Users\Admin\AppData\Local\Temp\451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RCX6E6A.tmp

    Filesize

    992KB

    MD5

    7480bc904cd069810fca4c7775b50809

    SHA1

    9b05fcecda43b6ffcda0c0913020afa53da8ac73

    SHA256

    28413c38807d7d54a000191fd57f1e6a8b99c1e17949b361f38cbba4bf66c480

    SHA512

    f35d938c16ea1dfa6fa9e316d3e093cc0031280f34cc07cad8c1120dc481bf48294cf3a288335a3e867d9b622512a3228f6f7a12519d99ba6b142fb3a22b207a