Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 05:34

General

  • Target

    c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe

  • Size

    488KB

  • MD5

    5db385a524c64ac8c192c4c44d561c27

  • SHA1

    40d891d8e7a9fabd0b81002807227d76ceff1478

  • SHA256

    c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78

  • SHA512

    291d7167ff1135db149ef75df4fd0db3ffdf6fae1a0773e966262c39e5c90b46d0e44fe633c8ef3db5e7c50bce60ea0e365d075b684e84361474fcbaaa7811e1

  • SSDEEP

    12288:F13ak/mBXTG4/1v08KI7ZnMEF76JqmsvZ4jvSlu:fak/mBXTV/R0nEF76gFZ0vF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe
    "C:\Users\Admin\AppData\Local\Temp\c752cf3a41ee2b01e7ec0f27f3dcb2df8948feb2b37d01bdbf9c679d1d32ae78.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\chromedriver\logs.dat

    Filesize

    144B

    MD5

    7ed5628bf7bb4dea54a5cb16f17d2e22

    SHA1

    0b0ed7f67f4ecbab9a0bdb0e5ff43e62a8c914d3

    SHA256

    ea3d7df0d583b893750dbf9aacc8c1e05b73cc4c585c616146bd4d5bc8ac2d81

    SHA512

    70154217989b7ee315306e1a51efa545f67e70b9afc9f39cc1f2bcd412509cc8fe87541ac6075037f22b7900c93b91355b92fdce6f71c6915bc3d23047ba9c93