Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
Resource
win10v2004-20240802-en
General
-
Target
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
-
Size
430KB
-
MD5
843ada62b385071f0770466fcdc1e3bc
-
SHA1
ba64ee4ca4bb76a88304d98fbec077c1ff8b01dc
-
SHA256
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760
-
SHA512
9f3ef5cdf8268c4bafb50615de754550fc9f030ceb9541dfa06081893a85ceb4c5abced482d723ff75dacc2324627a37991c4f9bdf2900c673fe3082ab4b910d
-
SSDEEP
12288:p4tnf0sfAfuxVDch+TwyX3McvZPKWAgORb0tARm19p:gH4G/DKcHlp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe"C:\Users\Admin\AppData\Local\Temp\f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5810a632311d0db005a5d5f0be33870b2
SHA1691553b10b15e8d6d407b33464d1d3f57b4ce9c8
SHA256ed72225f1a46a95dc812b2cba4225e8812cb99d91aec1525b8c9d37d62d3de1e
SHA512367058be8eaaa738f1d7525578f1e810d5f85086ad9d3fdb7984ada8154ae32e4811a33d804de54f79013b4a579e075dc8322b1eb9ea7e5dd343d7c5e8bbc387