Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe
Resource
win10v2004-20240802-en
General
-
Target
ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe
-
Size
596KB
-
MD5
d3a88ab037be1a370dc7e5e637755df0
-
SHA1
5ca21e89aa63c56b91afeaf709b71c1e1cf15167
-
SHA256
ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3
-
SHA512
d28bbb14cff785b818448e68e39c66b1c2b262bae5381c8d7246229109a4daa0d836aa53b576de8eb1984c59b68dbffca646ead36e94196f594851ea0b717ea0
-
SSDEEP
12288:5H9Uy2krNPmiofiSMEVuKe2BV5Nu7tzf:5HCy2kRuifEVuKJBNu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exedescription pid Process Token: SeDebugPrivilege 2056 ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe"C:\Users\Admin\AppData\Local\Temp\ae5f4ca290fade383b6236a1c025027c4fc1247242a13e12f12e7f6be67f63a3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2056