Overview
overview
3Static
static
3CD/!startF.cmd
windows7-x64
1CD/!startF.cmd
windows10-2004-x64
1CD/start.cmd
windows7-x64
1CD/start.cmd
windows10-2004-x64
1CD/startd.cmd
windows7-x64
1CD/startd.cmd
windows10-2004-x64
1links.htm
windows7-x64
3links.htm
windows10-2004-x64
3start.exe
windows7-x64
3start.exe
windows10-2004-x64
3startd.cmd
windows7-x64
3startd.cmd
windows10-2004-x64
3startf.exe
windows7-x64
3startf.exe
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
CD/!startF.cmd
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CD/!startF.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CD/start.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
CD/start.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CD/startd.cmd
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CD/startd.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
links.htm
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
links.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
start.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
start.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
startd.cmd
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
startd.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
startf.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
startf.exe
Resource
win10v2004-20240802-en
General
-
Target
startf.exe
-
Size
161KB
-
MD5
86fbb282f46c7a8811b2f0606197cff3
-
SHA1
b3ac3c93488ab3a814386ed90b0e4e2638a575f3
-
SHA256
6548699fdeb314c57fd9eddf1af23182accc1a70221eab37e8ecdff74bd42ba4
-
SHA512
b53d056d9d42b1358081376b0f47a296ecf21d44ecfac36fcbdf724117c5be9f893d938cc787839406d5223c4f9498b308fccd0fa337040e8dc1424c2f07a4bd
-
SSDEEP
3072:y9scCLvy36NTBB+usaANuEE2YkoprXgEVHO4fP9C5apu:uXCLa36NTBB+us+1X7lhpu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language startf.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3080 startf.exe Token: SeRestorePrivilege 3080 startf.exe Token: SeBackupPrivilege 3080 startf.exe Token: SeDebugPrivilege 2796 start.exe Token: SeRestorePrivilege 2796 start.exe Token: SeBackupPrivilege 2796 start.exe Token: SeSecurityPrivilege 2796 start.exe Token: SeTcbPrivilege 2796 start.exe Token: SeImpersonatePrivilege 2796 start.exe Token: SeAssignPrimaryTokenPrivilege 2796 start.exe Token: SeCreateTokenPrivilege 2796 start.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 start.exe 2796 start.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 2796 3080 startf.exe 85 PID 3080 wrote to memory of 2796 3080 startf.exe 85 PID 3080 wrote to memory of 2796 3080 startf.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\startf.exe"C:\Users\Admin\AppData\Local\Temp\startf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\start.exe\\?\C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\start.exe /d2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2796
-