Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 02:01
Behavioral task
behavioral1
Sample
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
Resource
win10v2004-20241007-en
General
-
Target
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
-
Size
481KB
-
MD5
cd96d7adcc3aa40127ef1e252599ac19
-
SHA1
a12453fa9763923ad46ba34e2f6ae45baa7b9b37
-
SHA256
042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e
-
SHA512
c181e98474ac568a8e9bdad860dd1882fdde130afa4a174307afad0eeff0becec7feaab4e764871a32c4a343c2537cfdb326a8cfcc443cb15f13a5336e374b5e
-
SSDEEP
12288:VuD09AUkNIGBYYv4eK13x13nZHSRVMf139F5wIB7+IwtHwBtVxbesvZDSA+DY:409AfNIEYsunZvZ19Zbs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe"C:\Users\Admin\AppData\Local\Temp\042aa85d23a054fb5ec69c1d011b940013364bdcc86fa4a6ff625d72616d395e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c8d1df5686fd418cf39e7b6eab183664
SHA1b3d57a87ad7deb340e158eda9f5fbe9c080ce044
SHA256ada606a954b4fca770c28bab7db0589d08081f3435716befcd657b90414b2473
SHA512205dd276f05beef58a7b2905a754ca3a9ddfcd2dc5db1449298902eb88d17b81b29934b9a66a3c8ca4dc31c63307e1178e0964fbdf90c822dac0e864ded812bc