Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 03:07
Behavioral task
behavioral1
Sample
acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe
Resource
win10v2004-20241007-en
General
-
Target
acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe
-
Size
482KB
-
MD5
c8b01443f4db589fb8ef533221a96eb7
-
SHA1
494f01bbe4a55cf805a4d9b687d013182a1664fe
-
SHA256
acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85
-
SHA512
653d32a4cf91e61e4f5930db1fb5cdc6dfffc18dfd8c0c963eaddaf62a30bce45f1a1061d82176f8c669309acd54f33a4a1b57d473eb4116d3183e505b1f38be
-
SSDEEP
12288:913ak/mBXTG4/1v08KI7ZnMEF76JqmsvZQBS:Xak/mBXTV/R0nEF76gFZ+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4984 acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe"C:\Users\Admin\AppData\Local\Temp\acce12489529441885f80ffaf7c7a9e7002947ac34ee12b9830ccea01b310e85.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD59a61ce601d9408a4a9aa1606eca43102
SHA1c537652675bfae6061342da74c91f1cd833708ad
SHA25649ef4986bbaa2b7bb77935f8ebc58be02f00dc7eb26e3f256dff8e083a2bf294
SHA5129b86888d2586b2285a970bbc8aa4320f3d9eb2c9455028f294b615fea05e3f9e09720fd6f37aa265af520aa12de5f21b12a35dd69c14818e468b62fdeb3ba3b7