Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 07:02
Behavioral task
behavioral1
Sample
e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe
Resource
win10v2004-20241007-en
General
-
Target
e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe
-
Size
482KB
-
MD5
79341dbc13c02100fb9ec2ffa8a5e011
-
SHA1
87798cd51faf3996967d8cc377b14eed828d9595
-
SHA256
e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616
-
SHA512
695348d66c2bedc753344de0a59bb8fc05dbfdb2c52f9cdbb392d6ad37109a70ead8f4fd8cb2b3151174616eaaa64981ece3694f1c1f17ed34d2b87fa79cd224
-
SSDEEP
12288:x13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQES:jak/mBXTV/R0nEF76gFZH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3012 e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe"C:\Users\Admin\AppData\Local\Temp\e3fd8ca4874f45f60b922794a956c9ea8281f748da3959e8131f762af63a1616.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c03f8a6f9e79ff7c7bf6e68f32e49f3c
SHA1389da4d8de02da15602eafba2fecaeaec096ade3
SHA25696debc92fb91c3d6b83ef6a9927d7b01cd8f12d12c8b87f2d3819d0acf851e80
SHA5125d2e79fb93c32d6d0586ddb41b3d248e022dbcb6208c1d86439f953f415f890acd2802e028dcb777ca21ff4f4eff52889795c8bd9392cb6d4aa05f88ab1a0dd3