Resubmissions
26-07-2024 05:05
240726-frc1ds1drf 1025-07-2024 07:20
240725-h567hayclf 1024-07-2024 14:30
240724-rvd8ea1akj 1024-07-2024 13:56
240724-q83bqasdqb 1023-07-2024 11:06
240723-m7t26stbmr 10Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 05:05
Behavioral task
behavioral1
Sample
Release/Server.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Release/Server.exe
Resource
win10v2004-20240709-en
General
-
Target
Release/Server.exe
-
Size
1.0MB
-
MD5
97fdf675692906714405d7e9bd6a9c61
-
SHA1
f388a87852ca61122f2563b9919625d33c7efe78
-
SHA256
dd3c72966f70692309714ec42461021fef21c26ad33b1b43e3232186b632a44b
-
SHA512
06f371bbec435746a876bb8127979c46fb1a21949c7f2b1f0e7edd4895382c5018113d52cf86485fa8d269f5c4b597c2739519db11b78bb7574638272ebf925c
-
SSDEEP
24576:UcBAVQOcXu65lmmomlEkmmsEnE7E7E7EUmemmmmmmIDmeQaKM:USAVQTXuElmmomSkmmtEQQQUmemmmmmL
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2112 Server.exe 2112 Server.exe 2112 Server.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2112 Server.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_jmtcyt32s450mrkqcfhpdrl3u0cpu3sy\1.0.0.0\user.config
Filesize311B
MD5a35bc67d130a4fb76c2c2831cbdddd55
SHA166502423bba03870522e50608212b6ee27ebf4c5
SHA256e94a97e512fbc8ed9f5691d921fdeddbff4cc16b024c5335adf66bff3a7a8192
SHA5124401b234d7914afa860e356be1667cc5f44402255f7cc6cc3d8df80883167f6b55463e62156df57be697ee501897fac61a71f97911c6fdb6630272341ac8a07e
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_jmtcyt32s450mrkqcfhpdrl3u0cpu3sy\1.0.0.0\user.config
Filesize434B
MD5cfcf8e91857f364e002065c52ff8f91c
SHA18407ecb3c33a1f3fcf18a723e6884acf7e5a0f4a
SHA256572dda8c7f211dc6a4efc7aecb4a54cb4e0ced1e4c9a4b9f96bb329c983c64e6
SHA512364fecac3a051441b4fefcebb2cc9e38632f99dd04593cd5d9b148986afb09b195e88cdbfa2e778b8934564b76d04fe053f919f0a60769b023f2f753ede06d1e
-
C:\Users\Admin\AppData\Local\Server\Server.exe_Url_jmtcyt32s450mrkqcfhpdrl3u0cpu3sy\1.0.0.0\user.config
Filesize560B
MD5463d2a6611fbb9f0657b8c8c9783f6e0
SHA19fbda301bda3be3c9c2362b08cf4046857e2612d
SHA25631d89529523e9b788ceec89cb43f1d2d26b44829e720324facf0906251135046
SHA512c2b30090064b389eed8f79429765dc881c74c83352c7bb6e81585b81e9df6010cc89150766e94bf5091279a54b50301a529af70ec2626e2da2a842040424b169
-
Filesize
1.3MB
MD514393eb908e072fa3164597414bb0a75
SHA15e04e084ec44a0b29196d0c21213201240f11ba0
SHA25659b9d95ae42e35525fc63f93168fe304409463ee070a3cf21a427a2833564b80
SHA512f5fc3d9e98cca1fbbbe026707086a71f801016348d2355541d630879ad51a850f49eb4a5f7a94e12a844d7a7108d69fa6d762ee19f4805d6aafef16259b4330b