Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 02:01
Behavioral task
behavioral1
Sample
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
Resource
win10v2004-20241007-en
General
-
Target
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
-
Size
481KB
-
MD5
cd96d7adcc3aa40127ef1e252599ac19
-
SHA1
a12453fa9763923ad46ba34e2f6ae45baa7b9b37
-
SHA256
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e
-
SHA512
c181e98474ac568a8e9bdad860dd1882fdde130afa4a174307afad0eeff0becec7feaab4e764871a32c4a343c2537cfdb326a8cfcc443cb15f13a5336e374b5e
-
SSDEEP
12288:VuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSA+DY:409AfNIEYsunZvZ19Zbs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe"C:\Users\Admin\AppData\Local\Temp\042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5a9d8aa655dea92563cfdd70471d3aeda
SHA1b222659ebbe45760d6f58757ba339fe90ab0bf6e
SHA25634cfe95fdb3613aa4fa597bdcb334e07b8727f548468391497af0ee4fe064047
SHA512aca856bec5ff16cc313545487f766cb3e84b9caf5c37d60e6ed4172e871fae398cb9419c8dbb259e5bea578a7a73d15af3110fbb3e55a836e27bc2c53079e1a3