Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-08-2024 20:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SpectrumInstaller 1.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
SpectrumInstaller 1.exe
Resource
win11-20240802-en
windows11-21h2-x64
4 signatures
150 seconds
General
-
Target
SpectrumInstaller 1.exe
-
Size
10KB
-
MD5
f80e3dbe24eb435b0ccfbe2669631021
-
SHA1
24b5dfddc15636378950081771892f27d4228ce6
-
SHA256
3f224e06cb7e57c1553ed15440da6cd4f261fccad857b1e404c0b0b3cd70ac95
-
SHA512
85b0e7b00d0cd43910436b619fa1dd9569ca485bb0dffcab76960e7d03e1a2e0530309b61641295f59f7b5bd9d6680fc14c21033fe27dd0267a826362fc27faa
-
SSDEEP
192:QIRREv+2q/A/apPBYmRBIAar3bu64AjzExUZ:Qdq4/aJ2m/x6CxU
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 2 raw.githubusercontent.com -
Program crash 1 IoCs
pid pid_target Process procid_target 1596 4372 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpectrumInstaller 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4372 SpectrumInstaller 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpectrumInstaller 1.exe"C:\Users\Admin\AppData\Local\Temp\SpectrumInstaller 1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 19242⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4372 -ip 43721⤵PID:1612