Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 02:02
Behavioral task
behavioral1
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win10v2004-20241007-en
General
-
Target
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
-
Size
481KB
-
MD5
7163fe5f3a7bcfdeec9a07137838012a
-
SHA1
3bd90557615ef95e4244bdbaa8e0e7fd949cdd3a
-
SHA256
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506
-
SHA512
ea6d91205ed0d53868f44077e1d6db3bf8d6e3607378be22e643df3777120aa36d53e39748e4220dbf1d3355a0b791b9a3e5ddc080018d169c81d7ce0afb6478
-
SSDEEP
12288:z13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQqS:5ak/mBXTV/R0nEF76gFZJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5a877b8423e69b3f42f545fbdb6834587
SHA1e799be3eb9c60a5a417510794e2540ec1b4c5336
SHA2565370748ad27df1b64b55b29858766ebeb63275619178dfe5b64f2409fd7f9254
SHA5122b2f87826cd959636ea7a707f9ab6aefd1a795fa12715bb31fc674be8e701fd4b915a816c0e136d8c949f61f01c6e0078396a4b4c58d8783087558487bf47b6d