Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe
Resource
win10v2004-20240802-en
General
-
Target
ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe
-
Size
1006KB
-
MD5
6cd1f21e9a9f22eddc9eac22f1a1615c
-
SHA1
3d15589a5416169850238d90a2309e33d388d83f
-
SHA256
ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd
-
SHA512
f1f9721fb7b895599eeaad236ac5acb4da88ef062654a887f1acbd803824a4e4b2d6d2ae32b804c60fcfb7d2a1d1623d7377116a0d76e592fae379ba73da42be
-
SSDEEP
24576:N6iNCoWTeS9oDhR6DPCbTgwMfUC8RN1vIlY/Qn1P:NPlS9oDhR/bAULhg
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4360 set thread context of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe Token: SeDebugPrivilege 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4360 wrote to memory of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87 PID 4360 wrote to memory of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87 PID 4360 wrote to memory of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87 PID 4360 wrote to memory of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87 PID 4360 wrote to memory of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87 PID 4360 wrote to memory of 3044 4360 ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe"C:\Users\Admin\AppData\Local\Temp\ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe"C:\Users\Admin\AppData\Local\Temp\ba631a7a096c982d286ad269b2cff3e81098626bbb5936decd3c16bad8b5d9bd.exe"2⤵PID:3044
-