Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 02:02
Behavioral task
behavioral1
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Resource
win10v2004-20241007-en
General
-
Target
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
-
Size
481KB
-
MD5
7163fe5f3a7bcfdeec9a07137838012a
-
SHA1
3bd90557615ef95e4244bdbaa8e0e7fd949cdd3a
-
SHA256
5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506
-
SHA512
ea6d91205ed0d53868f44077e1d6db3bf8d6e3607378be22e643df3777120aa36d53e39748e4220dbf1d3355a0b791b9a3e5ddc080018d169c81d7ce0afb6478
-
SSDEEP
12288:z13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQqS:5ak/mBXTV/R0nEF76gFZJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3428 5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"C:\Users\Admin\AppData\Local\Temp\5433726d3912a95552d16b72366eae777f5f34587e1bdaa0c518c5fcbc3d8506.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD54db2f11db0980aae5b5803cac3783cf6
SHA1e01052780d25ef533222590680bb82065f51032b
SHA256dd64089308e6b997f493178a6192ce9ad198ad81c71c69bdd713e63e9228423b
SHA51233a4bd947c1b5878e86772ba46bd0cceb44254ec98b970cd863520372c255dd2e2086166259161e69dab0364e2f402ac2e7be0c2913ef96d4b89b5ee6bc05956