Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 01:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
czOxHskgIAQwZ8m.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
czOxHskgIAQwZ8m.exe
-
Size
425KB
-
MD5
edb54a30972b862cfba8589bb1f67c7e
-
SHA1
7f3b9b36342bb863950e592063db38cd2c3f8bb9
-
SHA256
856b8775a8063900378a815cd03d0f9628c4296eddd93ac9e9cd52269178c079
-
SHA512
51f1e192a0f06472c5bf3da68e511d1112dd61a8a429aeb14c39e3d8e05b0448b5086d4367a2953b3dbbaa453faac63aa4319127aa9944e68334322cc6bc8f42
-
SSDEEP
12288:S0SrZ2vE4MtuTN6GLMX3a9sO81joauMuB3fj:Sf2vE9tuPgHa2O8hoauMuB
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
czOxHskgIAQwZ8m.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czOxHskgIAQwZ8m.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
czOxHskgIAQwZ8m.exepid Process 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe 784 czOxHskgIAQwZ8m.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
czOxHskgIAQwZ8m.exedescription pid Process Token: SeDebugPrivilege 784 czOxHskgIAQwZ8m.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
czOxHskgIAQwZ8m.exedescription pid Process procid_target PID 784 wrote to memory of 2828 784 czOxHskgIAQwZ8m.exe 31 PID 784 wrote to memory of 2828 784 czOxHskgIAQwZ8m.exe 31 PID 784 wrote to memory of 2828 784 czOxHskgIAQwZ8m.exe 31 PID 784 wrote to memory of 2828 784 czOxHskgIAQwZ8m.exe 31 PID 784 wrote to memory of 2788 784 czOxHskgIAQwZ8m.exe 32 PID 784 wrote to memory of 2788 784 czOxHskgIAQwZ8m.exe 32 PID 784 wrote to memory of 2788 784 czOxHskgIAQwZ8m.exe 32 PID 784 wrote to memory of 2788 784 czOxHskgIAQwZ8m.exe 32 PID 784 wrote to memory of 2700 784 czOxHskgIAQwZ8m.exe 33 PID 784 wrote to memory of 2700 784 czOxHskgIAQwZ8m.exe 33 PID 784 wrote to memory of 2700 784 czOxHskgIAQwZ8m.exe 33 PID 784 wrote to memory of 2700 784 czOxHskgIAQwZ8m.exe 33 PID 784 wrote to memory of 2764 784 czOxHskgIAQwZ8m.exe 34 PID 784 wrote to memory of 2764 784 czOxHskgIAQwZ8m.exe 34 PID 784 wrote to memory of 2764 784 czOxHskgIAQwZ8m.exe 34 PID 784 wrote to memory of 2764 784 czOxHskgIAQwZ8m.exe 34 PID 784 wrote to memory of 2668 784 czOxHskgIAQwZ8m.exe 35 PID 784 wrote to memory of 2668 784 czOxHskgIAQwZ8m.exe 35 PID 784 wrote to memory of 2668 784 czOxHskgIAQwZ8m.exe 35 PID 784 wrote to memory of 2668 784 czOxHskgIAQwZ8m.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"2⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"2⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"2⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"C:\Users\Admin\AppData\Local\Temp\czOxHskgIAQwZ8m.exe"2⤵PID:2668
-