Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
2FC414A5AA09B12153617FDA248C2FA1.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2FC414A5AA09B12153617FDA248C2FA1.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2FC414A5AA09B12153617FDA248C2FA1.exe
-
Size
463KB
-
MD5
2fc414a5aa09b12153617fda248c2fa1
-
SHA1
26076c134b320d1e460994ee5a23d6623c88b2e4
-
SHA256
229d6fa85977393453f624b15628e65e70cb9d325b555a73931b3946463a560f
-
SHA512
11329c912e4a0afdfa4dbec0be69cd11476f9f7c0b019effc48a99a59897232d7d7711f37be2ebceadc76ef8ef002ef8b34984d3db210c66aec1b34866492a89
-
SSDEEP
6144:PrevVZBVl9mwOOrjqShL/0P+Fg27QCNyMRCSEhDLutLmK/yED:PKnlMwTrjqgT0PugetEdutLmK/1D
Score
1/10
Malware Config
Signatures
-
Kills process with taskkill 1 IoCs
pid Process 2136 taskkill.exe -
Modifies Control Panel 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\iTimePrefix = "0" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\sDate = "-" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\sTimeFormat = "HH:mm:ss" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\iTLZero = "1" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\sTime = ":" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\sShortDate = "yyyy-MM-dd" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\iDate = "2" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\sLongDate = "yyyy-MM-dd" 2FC414A5AA09B12153617FDA248C2FA1.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\iTime = "1" 2FC414A5AA09B12153617FDA248C2FA1.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 640 2FC414A5AA09B12153617FDA248C2FA1.exe 640 2FC414A5AA09B12153617FDA248C2FA1.exe 640 2FC414A5AA09B12153617FDA248C2FA1.exe 640 2FC414A5AA09B12153617FDA248C2FA1.exe 640 2FC414A5AA09B12153617FDA248C2FA1.exe 640 2FC414A5AA09B12153617FDA248C2FA1.exe 640 2FC414A5AA09B12153617FDA248C2FA1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2136 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 640 wrote to memory of 2136 640 2FC414A5AA09B12153617FDA248C2FA1.exe 28 PID 640 wrote to memory of 2136 640 2FC414A5AA09B12153617FDA248C2FA1.exe 28 PID 640 wrote to memory of 2136 640 2FC414A5AA09B12153617FDA248C2FA1.exe 28 PID 640 wrote to memory of 2136 640 2FC414A5AA09B12153617FDA248C2FA1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2FC414A5AA09B12153617FDA248C2FA1.exe"C:\Users\Admin\AppData\Local\Temp\2FC414A5AA09B12153617FDA248C2FA1.exe"1⤵
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im audiosrv2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2136
-