Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 07:12

General

  • Target

    1737011466a027307a352faf9e32ef39ba27452f152a9b2d726d27241c020c80660bca47e3914.dat-decoded.exe

  • Size

    482KB

  • MD5

    f0eca2041c0ee9f485ee76e6c5c28692

  • SHA1

    9481379427b032c592d249adc8a0a0753f63f395

  • SHA256

    eb6a2103544522bc1af26a8e38165dc04dd5bc1daa10fb08584befa3a4cd144d

  • SHA512

    7ea3e0dd1198454ff1dd587dd45cc6e8e0e497dc9d2186f3ec4f2cbbc533b2e5f8b869a2029a21ddde000cddbc6a7b369570da9329995cf29a621478c35b0287

  • SSDEEP

    12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQtS:jak/mBXTV/R0nEF76gFZO

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1737011466a027307a352faf9e32ef39ba27452f152a9b2d726d27241c020c80660bca47e3914.dat-decoded.exe
    "C:\Users\Admin\AppData\Local\Temp\1737011466a027307a352faf9e32ef39ba27452f152a9b2d726d27241c020c80660bca47e3914.dat-decoded.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\zomb\logs.dat

    Filesize

    144B

    MD5

    636aa840569278fb56906b745b9a6ed4

    SHA1

    2485d684acca7492fb71da70f61a24f4c13e9935

    SHA256

    70807f5c153a33aa464fd431796a54f548601daf67d10c50d50760b9b4705cb7

    SHA512

    943dd50ee4e14c4390adf83010aafdc3638b6a18a4ee111fad205fe9ee72863bb3151f68fa4cc2cd703547e085e85e8cfcde974c6974e5c116f5d81e9e23b5db