Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
81da307f6ebdfe9b7333214ecb7578ac.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81da307f6ebdfe9b7333214ecb7578ac.exe
Resource
win10v2004-20240802-en
General
-
Target
81da307f6ebdfe9b7333214ecb7578ac.exe
-
Size
93KB
-
MD5
81da307f6ebdfe9b7333214ecb7578ac
-
SHA1
2d14a0d7317309a0a6bfd5f9c238e08fb8ce77dc
-
SHA256
87fa4f71ff9faabc9fe17e65a9c8583a789812ba8d6ff868d61d14455b305aa1
-
SHA512
39dc804fe030b684228dc34600091cd4abf476a3c182345a675197ffb655d4abc2cfa73a8b8e9bdb78a2d785f258726aaf5981a914df4b3bff1f8713ffe8dedb
-
SSDEEP
1536:e+mkHWT+KOo5rJ+aAXaJRGrSxTR3wuAlyT9sYmH7IHSTjQtfCdSDDCA:e+vHWx5rJYaJ53wVyT9sYmbPQtaLA
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 5004 81da307f6ebdfe9b7333214ecb7578ac.exe 5004 81da307f6ebdfe9b7333214ecb7578ac.exe 5004 81da307f6ebdfe9b7333214ecb7578ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81da307f6ebdfe9b7333214ecb7578ac.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3484 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\81da307f6ebdfe9b7333214ecb7578ac.exe"C:\Users\Admin\AppData\Local\Temp\81da307f6ebdfe9b7333214ecb7578ac.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5004
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b5be0e441e04e5bf077a90097b169d22
SHA122fdf908102ae4f45e45b354e2f28a9ac17eb684
SHA2567f267c0c300ee645624dbff22329d8a1e86c2e147ee803a34c43bdee76da0255
SHA5123cfc02b01e67cea80354de4725ec66fc1314ef68ec577a2d6f9f9bb6f8c450c777fd3ce32c21a59b935b401151221d1506d7c795dcd4e59edcf9d6a15b14c2d6
-
Filesize
6KB
MD50de5df3c9d2452bf3ab3f5f4f33b4234
SHA1ec3e045db9d32074e374e1811a9ce6cc0940c1c9
SHA2569104a91037ca7fbf0965dd7191ab5e945291275c0f0d27ac42d3b3c61021dc02
SHA5129aa5c589910356cb7b50cc67a3cd92f103d3de0dc1524a85fe5163e0efb31252d0b99831ddbcfa887645ddf9c9a508ac94377371e890ea5f980ac893dc53f621
-
Filesize
13KB
MD5e00dcb7f9504bd66911d1c290d4f0cdb
SHA127aacdcd9835a917b40d7938ab42999307d3a3cc
SHA2568922810a1ed1e9e3b136d9b24066beccab0c2418177c81b43195bcc5461b0194
SHA512612e2101ba07d7f9837c46ae4170436718af8fa538b2302a72dddee8dacd4a96ed93f4adcbb8a2678e39407fe7851618c388c58871a4127a42e024be3a2fdc1b