Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 09:25
Behavioral task
behavioral1
Sample
9b122129429710ee6182b41434ab0a70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9b122129429710ee6182b41434ab0a70N.exe
Resource
win10v2004-20240802-en
General
-
Target
9b122129429710ee6182b41434ab0a70N.exe
-
Size
241KB
-
MD5
9b122129429710ee6182b41434ab0a70
-
SHA1
dd959df7e840b6901c87f117b0fea62d00388635
-
SHA256
94a8b79bc344f3522b5fa6f15d0dbb5e886b80b15d1b8008495ccd857d4e1f3e
-
SHA512
9218ebe2e1f48ee2d0c0b35c55ed59bfc7f5f8ef0f0041f29f9a36bc4947e6e35cc8b8640d0eb26302b07487cf40bbc62e77fe8937473016eff64a1a48b0600b
-
SSDEEP
3072:vJ+uIoN36tcQviFCZsBn7fWl9zdaF9bfYvMFXEqukVg9MDBfU3hJt:v2j9z5vMFXEgOMDBc3h
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b122129429710ee6182b41434ab0a70N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe 3012 9b122129429710ee6182b41434ab0a70N.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe Token: 33 3012 9b122129429710ee6182b41434ab0a70N.exe Token: SeIncBasePriorityPrivilege 3012 9b122129429710ee6182b41434ab0a70N.exe