Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
Resource
win10v2004-20240802-en
General
-
Target
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
-
Size
430KB
-
MD5
843ada62b385071f0770466fcdc1e3bc
-
SHA1
ba64ee4ca4bb76a88304d98fbec077c1ff8b01dc
-
SHA256
f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760
-
SHA512
9f3ef5cdf8268c4bafb50615de754550fc9f030ceb9541dfa06081893a85ceb4c5abced482d723ff75dacc2324627a37991c4f9bdf2900c673fe3082ab4b910d
-
SSDEEP
12288:p4tnf0sfAfuxVDch+TwyX3McvZPKWAgORb0tARm19p:gH4G/DKcHlp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4896 f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4896 f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4896 f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe"C:\Users\Admin\AppData\Local\Temp\f99f6bec0e70174987064d8c3b962c228d2f69c75ca39a8ebff238f696489760.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5a03e9e345a6a16ac4f3d2752dc25d471
SHA1d4960bec4a4a3439f17d01511c93bf4e1b81ec77
SHA2569e51877597ba2557d188500b6a9c2500780497c282f64036dad34d2228b45b99
SHA51210a77093f6b6aed16deda7617b8727eeda7854f93a6349bcb0775d782c42b1efea411f7b75856e749f4e0520772370428e8c218bb6d66f53bd884b444c7696df