Resubmissions
27/07/2024, 01:26
240727-btjhqs1bqc 321/02/2023, 10:55
230221-m1mdragd5y 121/02/2023, 10:48
230221-mwehcaee59 10Analysis
-
max time kernel
17s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/07/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
PandorahVNC.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
PandorahVNC.exe
Resource
win11-20240709-en
General
-
Target
PandorahVNC.exe
-
Size
121.7MB
-
MD5
7e0c8dba7497c6c4239531073a04628e
-
SHA1
d82c10b1ed2527f971b2c63e75c15a6b746119b0
-
SHA256
100dc0db633b1dea1a0c5012f2364ff0d201ff203de1ea3820f432fc51751652
-
SHA512
e8e79732885f4f38c15fe1e78e740b0678de64c5b8875f590678eca8229190ab84be04724f934037a8837238431c1c0b5809eebdc5e0ee8eb610be012996b722
-
SSDEEP
3145728:Rlhah9cOLbrHMevdE5x89uYrM0cqgW05zaWPP:p09cOnrBdE5x50ce0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PandorahVNC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4756 PandorahVNC.exe