Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 05:34
Behavioral task
behavioral1
Sample
c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe
Resource
win10v2004-20241007-en
General
-
Target
c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe
-
Size
488KB
-
MD5
5db385a524c64ac8c192c4c44d561c27
-
SHA1
40d891d8e7a9fabd0b81002807227d76ceff1478
-
SHA256
c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78
-
SHA512
291d7167ff1135db149ef75df4fd0db3ffdf6fae1a0773e966262c39e5c90b46d0e44fe633c8ef3db5e7c50bce60ea0e365d075b684e84361474fcbaaa7811e1
-
SSDEEP
12288:F13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZ4jvSlu:fak/mBXTV/R0nEF76gFZ0vF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5096 c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe"C:\Users\Admin\AppData\Local\Temp\c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD57ed5628bf7bb4dea54a5cb16f17d2e22
SHA10b0ed7f67f4ecbab9a0bdb0e5ff43e62a8c914d3
SHA256ea3d7df0d583b893750dbf9aacc8c1e05b73cc4c585c616146bd4d5bc8ac2d81
SHA51270154217989b7ee315306e1a51efa545f67e70b9afc9f39cc1f2bcd412509cc8fe87541ac6075037f22b7900c93b91355b92fdce6f71c6915bc3d23047ba9c93