Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
TaskPuppeteer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
TaskPuppeteer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TaskPuppeteer.exe
Resource
win11-20240802-en
General
-
Target
TaskPuppeteer.exe
-
Size
6KB
-
MD5
31c673343349c4539da363465cb991a2
-
SHA1
b2463951f18f7d2b921dfc0bb315b19ea8212882
-
SHA256
daa57c8d67828cde6e9d8eea3252854f17db31d2f6f52fc251a0c73d81c27dbf
-
SHA512
6510540b1728b82a792213dd113f92c34a46e4d0ca8a2c5ae7912e82f1a3f1a167edf70514849a5c2c62e4c97aa4054bad877ea8eb2f0b1ddc619ef4422712e4
-
SSDEEP
96:JZWxktDZnJ6dguC/ftjjEvzzgMd10VgepT3HczTcU8zNt:HW2xZHtj6zzDP0VgKT3YTcUG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaskPuppeteer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3104 wrote to memory of 884 3104 TaskPuppeteer.exe 83 PID 3104 wrote to memory of 884 3104 TaskPuppeteer.exe 83 PID 3104 wrote to memory of 884 3104 TaskPuppeteer.exe 83 PID 884 wrote to memory of 4720 884 cmd.exe 86 PID 884 wrote to memory of 4720 884 cmd.exe 86 PID 884 wrote to memory of 4720 884 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\TaskPuppeteer.exe"C:\Users\Admin\AppData\Local\Temp\TaskPuppeteer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /query /tn "Windows Defender Visual Basic Task Scheduler" /fo LIST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\schtasks.exeschtasks /query /tn "Windows Defender Visual Basic Task Scheduler" /fo LIST3⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-