Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
TaskPuppeteer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
TaskPuppeteer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TaskPuppeteer.exe
Resource
win11-20240802-en
General
-
Target
TaskPuppeteer.exe
-
Size
6KB
-
MD5
31c673343349c4539da363465cb991a2
-
SHA1
b2463951f18f7d2b921dfc0bb315b19ea8212882
-
SHA256
daa57c8d67828cde6e9d8eea3252854f17db31d2f6f52fc251a0c73d81c27dbf
-
SHA512
6510540b1728b82a792213dd113f92c34a46e4d0ca8a2c5ae7912e82f1a3f1a167edf70514849a5c2c62e4c97aa4054bad877ea8eb2f0b1ddc619ef4422712e4
-
SSDEEP
96:JZWxktDZnJ6dguC/ftjjEvzzgMd10VgepT3HczTcU8zNt:HW2xZHtj6zzDP0VgKT3YTcUG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaskPuppeteer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2656 2232 TaskPuppeteer.exe 31 PID 2232 wrote to memory of 2656 2232 TaskPuppeteer.exe 31 PID 2232 wrote to memory of 2656 2232 TaskPuppeteer.exe 31 PID 2232 wrote to memory of 2656 2232 TaskPuppeteer.exe 31 PID 2656 wrote to memory of 2652 2656 cmd.exe 33 PID 2656 wrote to memory of 2652 2656 cmd.exe 33 PID 2656 wrote to memory of 2652 2656 cmd.exe 33 PID 2656 wrote to memory of 2652 2656 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\TaskPuppeteer.exe"C:\Users\Admin\AppData\Local\Temp\TaskPuppeteer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /query /tn "Windows Defender Visual Basic Task Scheduler" /fo LIST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\schtasks.exeschtasks /query /tn "Windows Defender Visual Basic Task Scheduler" /fo LIST3⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-