Analysis
-
max time kernel
39s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 01:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp6yepb2lk.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp6yepb2lk.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
14 signatures
150 seconds
General
-
Target
tmp6yepb2lk.exe
-
Size
77KB
-
MD5
850bb666d97b841c0df079f321a440f7
-
SHA1
3618d43d64d281a2aa2d551abd5bb805e6352a51
-
SHA256
b30ebf707e45596c98eef8d06bdb344c616a1f8e1722b3c1ec3f8ad7635d91f4
-
SHA512
7900edec0ccf7e7a4a459f98bb31b07815b2586bc5e461f30474b4aca25b3e40e188ccbd465fed76682111fb6651b5631ddf3e857324f0f1b8d05e37575f8407
-
SSDEEP
768:mKGhS24vnz5SU2Ip4jBqltCF0AxEjenoB69+FxC:u824vnlSFHBWAxEjc+a
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xkicthde = "C:\\Users\\Admin\\AppData\\Roaming\\Xkicthde.exe" tmp6yepb2lk.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4676 2124 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp6yepb2lk.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2124 tmp6yepb2lk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 tmp6yepb2lk.exe Token: SeDebugPrivilege 2124 tmp6yepb2lk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4676 2124 tmp6yepb2lk.exe 29 PID 2124 wrote to memory of 4676 2124 tmp6yepb2lk.exe 29 PID 2124 wrote to memory of 4676 2124 tmp6yepb2lk.exe 29 PID 2124 wrote to memory of 4676 2124 tmp6yepb2lk.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp6yepb2lk.exe"C:\Users\Admin\AppData\Local\Temp\tmp6yepb2lk.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 11362⤵
- Program crash
PID:4676
-