Analysis
-
max time kernel
78s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe
Resource
win10v2004-20240709-en
General
-
Target
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe
-
Size
5.6MB
-
MD5
753df56b82850430b8c7e25aaa93ea66
-
SHA1
5977fa278c4ab6f2e515efe72f09c85e67ff0590
-
SHA256
25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2
-
SHA512
8e25374af7d513be5b2f6700dc4d07fdeea75e2fc56b32cd0ea6c5117334a02ede3cace39836df64680da92d5231d08c2f08798e9a27f2315496beda37710ac3
-
SSDEEP
98304:Qdv4xixurOYvLtWV9SxAPZl+RqgSRe4rcSRhE1RKsJgHXe8iDuLNuTTz:24QsrvvySshgSsR/mOJANi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2932 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2760 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2624 2760 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 30 PID 2760 wrote to memory of 2624 2760 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 30 PID 2760 wrote to memory of 2624 2760 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 30 PID 2760 wrote to memory of 2624 2760 25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe 30 PID 2624 wrote to memory of 2932 2624 cmd.exe 32 PID 2624 wrote to memory of 2932 2624 cmd.exe 32 PID 2624 wrote to memory of 2932 2624 cmd.exe 32 PID 2624 wrote to memory of 2932 2624 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe"C:\Users\Admin\AppData\Local\Temp\25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 10 & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2932
-
-