Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe
Resource
win10v2004-20240802-en
General
-
Target
1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe
-
Size
3.9MB
-
MD5
ad7d05b568d5c1cf607fe1a1a6548a97
-
SHA1
bf79682028ddf80b9691e8726abfbf10c1e5c94d
-
SHA256
1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0
-
SHA512
41a3521967bbdb5c334a8f8948cd3793960ebfacab56e48d21cf5550e90c42d95893b4c07e6bb0816c0c5ceba28c3090912b59337ad6fac42cff5c249f64dd07
-
SSDEEP
49152:1m5Yq6zV7yHOYUE8vOpbdVrbOmFgqCzgfWNh3/VYxlkKDOQEOwo2dkRcTC:1m5/6zdyHLU2pBVrPWNh3NyROfOh2dkv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2680 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2680 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe 2680 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe 2680 1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe"C:\Users\Admin\AppData\Local\Temp\1d91324107788615f4333800e2634c4456bcaf206bef6ada3f24449e294437a0.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD544d1fedbe3cc03d261c24f4ff5846f05
SHA12e53bdd174f33ef90913ace8e815f7b56befddcc
SHA2566d9564f129a56b03a7c5d9899148d665368c0ff587f11252d6800c9c9e0144d6
SHA512e7a65e2c220adb88fa179ac151252ef3bb1ece7b8c7f47800dfc3b60bccbe100a358b872d45214fb8b3e39b4ef2e25a5c51d70292b4aa2363ae13ab19d962eeb