Analysis
-
max time kernel
120s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/02/2025, 21:06
Behavioral task
behavioral1
Sample
f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe
Resource
win10v2004-20250211-en
General
-
Target
f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe
-
Size
469KB
-
MD5
cb21cf3e8992ce458ad2e763ecc2a8e0
-
SHA1
3d233e2b782da7135dda6a07dd835ddbb70152a4
-
SHA256
f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97e
-
SHA512
896e2833fa2b31ae086c1680c8bd53a5aee2bd45ab614bea0e62703086b756ab43aee328dfe77b2659059ccd096a37963ccf6185ecb28651082f296d514b6a1e
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSTn9:uiLJbpI7I2WhQqZ7T9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe"C:\Users\Admin\AppData\Local\Temp\f792059834427eb907c412d0a0efd0c599126088779bcf2daa9762af55d0d97eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5d6af2f3098a55224cc91ce8c7d8fb823
SHA1c1ba0e510964e3040284677ef58eae72ad1d77a6
SHA256c5bfdde45b1ffdf8d54422d691ce4e1c833c02fdd64c98857035997d112c0d71
SHA512bb3362d0278d721808d1fdfccacb91985025459b4a05ac4465049ac68e73a7a296d684efd63ca766949515410b9307732dd606cab24747f65b866fcf2a06f743