Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe
Resource
win10v2004-20240802-en
General
-
Target
9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe
-
Size
1.7MB
-
MD5
2eccd72c083a47c9dc794663528747bc
-
SHA1
b16ff548d8f95346bf4c8bd3f4601d272fe54e7c
-
SHA256
9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e
-
SHA512
1b90afe3301998dd9e132b1d916d3753f09235f754d9642fb986f7a8fbb18a7a3eb823b5e6a65b03cdd8f679d28cf94fca55a22f20916cc68f3d53f14d6160de
-
SSDEEP
24576:/1SsxjXH9vhIN7hssNtWoXJ+1RHk87SVWwNRd1RH:/x1Hj+Nt3Sz7SVWwNRh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe"C:\Users\Admin\AppData\Local\Temp\9b4cadfffffc382ddf630d2a2755c817cc4f2b13991479264cea1693ef29a23e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2228