Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 07:12

General

  • Target

    1737011466a027307a352faf9e32ef39ba27452f152a9b2d726d27241c020c80660bca47e3914.dat-decoded.exe

  • Size

    482KB

  • MD5

    f0eca2041c0ee9f485ee76e6c5c28692

  • SHA1

    9481379427b032c592d249adc8a0a0753f63f395

  • SHA256

    eb6a2103544522bc1af26a8e38165dc04dd5bc1daa10fb08584befa3a4cd144d

  • SHA512

    7ea3e0dd1198454ff1dd587dd45cc6e8e0e497dc9d2186f3ec4f2cbbc533b2e5f8b869a2029a21ddde000cddbc6a7b369570da9329995cf29a621478c35b0287

  • SSDEEP

    12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQtS:jak/mBXTV/R0nEF76gFZO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1737011466a027307a352faf9e32ef39ba27452f152a9b2d726d27241c020c80660bca47e3914.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1737011466a027307a352faf9e32ef39ba27452f152a9b2d726d27241c020c80660bca47e3914.dat-decoded.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\zomb\logs.dat

    Filesize

    144B

    MD5

    bbc8c847d869a1d18350a9a9c05b0cdf

    SHA1

    ff046a6d9171bb5fd9e3acb98353a18d86895c25

    SHA256

    7f1a9fb9ac705e1cdb9b9764f3f3be06d7169c05af9da75f0be5798cea1816e8

    SHA512

    3acfee7a22ebcdb947c421f67672493ee0d1f80721164be2481469dd3cd65583dcea193494fec2e0ad8280a71558902fe6d3da732d48eec30975a01a7bcbfa80