Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 01:56
Behavioral task
behavioral1
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win10v2004-20241007-en
General
-
Target
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
-
Size
481KB
-
MD5
7163fe5f3a7bcfdeec9a07137838012a
-
SHA1
3bd90557615ef95e4244bdbaa8e0e7fd949cdd3a
-
SHA256
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506
-
SHA512
ea6d91205ed0d53868f44077e1d6db3bf8d6e3607378be22e643df3777120aa36d53e39748e4220dbf1d3355a0b791b9a3e5ddc080018d169c81d7ce0afb6478
-
SSDEEP
12288:z13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQqS:5ak/mBXTV/R0nEF76gFZJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 848 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD56ed65cb917c62cbdeed3dc2e5a738533
SHA10f2ce5a3b5b28f927e3c13a0f280a6431ccdaf72
SHA2562266f11da8563d9dbbdc2d32b74cd75f4c85fb45d5f1d4e3a4b2be5763bcb378
SHA5129b6cb12863b164936965bf66020a1e484b55832518b39539c9c35437510a5f955bda716f15c5c54c6d4b9b803ff3bbe6514ed8035d035adf1a47ada9d4bc5180