Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31/07/2024, 19:46
Behavioral task
behavioral1
Sample
example.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
example.exe
-
Size
202KB
-
MD5
0e9937a4cf3aacf8c372f3998ac58366
-
SHA1
0e50aeeb37429e8c67712c521975dcc58659ca8d
-
SHA256
36ff84072cb6ace8880a35249c1b95dbf048dd90f9189469892275c5fd122331
-
SHA512
9685e5bf83cfbc766acb8499d01fc9c6fb5bc4f071db9e0f5bfb5afd23ca99b84652cb5b649616b7c9d93b3c841bf305682f5e5bc8c174624e7fffa9d214079d
-
SSDEEP
6144:gLV6Bta6dtJmakIM5NzxAnuBlMvBZORkP:gLV6Btpmk4xAIFkP
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA example.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language example.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe 3664 example.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3664 example.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3664 example.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3664 example.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2348 3664 example.exe 90 PID 3664 wrote to memory of 2348 3664 example.exe 90 PID 3664 wrote to memory of 2348 3664 example.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\example.exe"C:\Users\Admin\AppData\Local\Temp\example.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2348
-