Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/08/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
TaskPuppeteer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
TaskPuppeteer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TaskPuppeteer.exe
Resource
win11-20240802-en
General
-
Target
TaskPuppeteer.exe
-
Size
6KB
-
MD5
31c673343349c4539da363465cb991a2
-
SHA1
b2463951f18f7d2b921dfc0bb315b19ea8212882
-
SHA256
daa57c8d67828cde6e9d8eea3252854f17db31d2f6f52fc251a0c73d81c27dbf
-
SHA512
6510540b1728b82a792213dd113f92c34a46e4d0ca8a2c5ae7912e82f1a3f1a167edf70514849a5c2c62e4c97aa4054bad877ea8eb2f0b1ddc619ef4422712e4
-
SSDEEP
96:JZWxktDZnJ6dguC/ftjjEvzzgMd10VgepT3HczTcU8zNt:HW2xZHtj6zzDP0VgKT3YTcUG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaskPuppeteer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3532 wrote to memory of 4108 3532 TaskPuppeteer.exe 78 PID 3532 wrote to memory of 4108 3532 TaskPuppeteer.exe 78 PID 3532 wrote to memory of 4108 3532 TaskPuppeteer.exe 78 PID 4108 wrote to memory of 1632 4108 cmd.exe 80 PID 4108 wrote to memory of 1632 4108 cmd.exe 80 PID 4108 wrote to memory of 1632 4108 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\TaskPuppeteer.exe"C:\Users\Admin\AppData\Local\Temp\TaskPuppeteer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /query /tn "Windows Defender Visual Basic Task Scheduler" /fo LIST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\schtasks.exeschtasks /query /tn "Windows Defender Visual Basic Task Scheduler" /fo LIST3⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-