Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 01:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe
-
Size
402KB
-
MD5
bb06ed23d87e32af51577a5c513154a4
-
SHA1
0465630ce40cd3eaf1e9f92daaccc16b9c3241e7
-
SHA256
cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944
-
SHA512
7915237ef8485cc63b57ce13adfffccf87510f896eac248299e3c5325c70a2e50b5657ed532ea09767c873d31afe3b956fbe807b6b4384ec6fa99836fb19d0a9
-
SSDEEP
6144:zmb3/3zvZ74J5spMIUYYKUeq7a/WUuufBvRiD5a:2v54Jq1B6L7UuupA
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe"C:\Users\Admin\AppData\Local\Temp\cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2380