Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 01:56
Behavioral task
behavioral1
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win10v2004-20241007-en
General
-
Target
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
-
Size
481KB
-
MD5
7163fe5f3a7bcfdeec9a07137838012a
-
SHA1
3bd90557615ef95e4244bdbaa8e0e7fd949cdd3a
-
SHA256
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506
-
SHA512
ea6d91205ed0d53868f44077e1d6db3bf8d6e3607378be22e643df3777120aa36d53e39748e4220dbf1d3355a0b791b9a3e5ddc080018d169c81d7ce0afb6478
-
SSDEEP
12288:z13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQqS:5ak/mBXTV/R0nEF76gFZJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5a4bdd7aad8cc5af1dfcf9909d11cf2bb
SHA1add4d87200812d11165ecdf6623b3d8d31393603
SHA256729f5133c12e3d57cd6f72bcf560507ea23b5784435b00f9a1b31efa31a7f742
SHA512966b4e77b86883b780bf6851d1eeb702024eb967e24c9511b61fd3b081256f036f053ec5d1f95bae8b0fc6594071f24dc4e1d4c2cafc24d5a7a617c4e9ce901a