Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:51
Static task
static1
Behavioral task
behavioral1
Sample
451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe
Resource
win10v2004-20241007-en
General
-
Target
451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe
-
Size
992KB
-
MD5
91013321a2adb3f74a4cd2963526c6c7
-
SHA1
bc407f2bb36876b94ca84df8c95eceadb0269c57
-
SHA256
451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68
-
SHA512
55f30b66b9252b79f8df81693d08396457c8861bf78a5e6e365e42e51b43701335244b24deb1108d3922b94e5ffa45df8469c1f5acb6444252550530c6ba6263
-
SSDEEP
24576:K6mKfjqbsU5rcANm50kz1VaoUSbgaCsPd/:K6mejeCCOn14oUuL1Pd/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3412 451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3412 451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe 3412 451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe 3412 451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe 3412 451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe"C:\Users\Admin\AppData\Local\Temp\451960411aa42742f3127bcbe8a07b8ebfeba145a9ecf1a8b940560f52222d68.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992KB
MD57480bc904cd069810fca4c7775b50809
SHA19b05fcecda43b6ffcda0c0913020afa53da8ac73
SHA25628413c38807d7d54a000191fd57f1e6a8b99c1e17949b361f38cbba4bf66c480
SHA512f35d938c16ea1dfa6fa9e316d3e093cc0031280f34cc07cad8c1120dc481bf48294cf3a288335a3e867d9b622512a3228f6f7a12519d99ba6b142fb3a22b207a