Overview
overview
3Static
static
3hydra-5.4-....8.dll
windows7-x64
3hydra-5.4-....8.dll
windows10-2004-x64
3hydra-5.4-....8.dll
windows7-x64
3hydra-5.4-....8.dll
windows10-2004-x64
3hydra-5.4-...n1.dll
windows7-x64
3hydra-5.4-...n1.dll
windows10-2004-x64
3hydra-5.4-...ra.exe
windows7-x64
1hydra-5.4-...ra.exe
windows10-2004-x64
3hydra-5.4-...or.exe
windows7-x64
1hydra-5.4-...or.exe
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
hydra-5.4-win/cygcrypto-0.9.8.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
hydra-5.4-win/cygcrypto-0.9.8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
hydra-5.4-win/cygssl-0.9.8.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
hydra-5.4-win/cygssl-0.9.8.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
hydra-5.4-win/cygwin1.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
hydra-5.4-win/cygwin1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
hydra-5.4-win/hydra.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
hydra-5.4-win/hydra.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
hydra-5.4-win/pw-inspector.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
hydra-5.4-win/pw-inspector.exe
Resource
win10v2004-20240802-en
General
-
Target
hydra-5.4-win/pw-inspector.exe
-
Size
14KB
-
MD5
b56e5f037b66cadcddd3f730d12b9548
-
SHA1
155ee9d17a0f3109b62f0ad22214a7f954a8aaff
-
SHA256
41a618d8ca47a5eeddd8206efe3c01edf2d89ff58925be32328b7a1409f26fe7
-
SHA512
54c624ae8eb2227fca838090f02ee2554f8060111bd822945a51fce4c2f8ec4d6213b14613e37ce9aae6075d48b518335172f6a2ce4170bc50bdadab0080a299
-
SSDEEP
192:jSKeMa60i96YAcQ9eob7Th5YkUCYKr6HjgO1j8U7wD:jRL6YQDrjUCvr6HkO6d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pw-inspector.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 5032 pw-inspector.exe Token: SeChangeNotifyPrivilege 5032 pw-inspector.exe Token: SeRestorePrivilege 5032 pw-inspector.exe Token: SeChangeNotifyPrivilege 5032 pw-inspector.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 5032 1916 pw-inspector.exe 87 PID 1916 wrote to memory of 5032 1916 pw-inspector.exe 87 PID 1916 wrote to memory of 5032 1916 pw-inspector.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\pw-inspector.exe"C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\pw-inspector.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\pw-inspector.exe"C:\Users\Admin\AppData\Local\Temp\hydra-5.4-win\pw-inspector.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-