Overview
overview
7Static
static
3Output_CR_KeyGen.exe
windows7-x64
7Output_CR_KeyGen.exe
windows10-2004-x64
7$TEMP/BASSMOD.dll
windows7-x64
3$TEMP/BASSMOD.dll
windows10-2004-x64
3$TEMP/R2RJUCE.dll
windows7-x64
3$TEMP/R2RJUCE.dll
windows10-2004-x64
3$TEMP/keygen.exe
windows7-x64
3$TEMP/keygen.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
Output_CR_KeyGen.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Output_CR_KeyGen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/BASSMOD.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$TEMP/BASSMOD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/R2RJUCE.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/R2RJUCE.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/keygen.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$TEMP/keygen.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/keygen.exe
-
Size
491KB
-
MD5
b7a0d2a3cc5f085ecf92aa825b7ffe10
-
SHA1
a1bc7ec71149911f1805d0120b1be59e70c9912c
-
SHA256
c4c81270316396493d689feda96cff009d483803a43969d89734191972e8b4bf
-
SHA512
0b9cd151c23444a5d5d68197773a5abaee8b6ca831b448e98167b53054d5612896e79d1b6f509a196a62ddb5e8c0a51c4ba9fa36ca0a16d2f4163aac3b7c470e
-
SSDEEP
6144:bcmzikEPDonRgNgz1+hw6hNgPfHv9PAimIAO5Rv0oWrc+:bc/kEPDonR6Y436vRN0oWH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2392 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2392 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\keygen.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\keygen.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2284
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392