Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:19
Static task
static1
Behavioral task
behavioral1
Sample
6a66f72240e54890ee22ddc8db89b1d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a66f72240e54890ee22ddc8db89b1d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a66f72240e54890ee22ddc8db89b1d0N.exe
-
Size
1.0MB
-
MD5
6a66f72240e54890ee22ddc8db89b1d0
-
SHA1
b6f480b38d338ea5ebbdd41339d0c6aa33c2ded1
-
SHA256
d35c5edb0c6aee6ad29e242d2555aef356f27d3ea5b4057a934f04c259439932
-
SHA512
60d6c1fd6869f55ada26d08109cd68032d55d15c6dc3e72b02cb9a9b07fd76686cb01a4e1c2f610cc993b391cabd006de62a2d6903ca23d0c97c9696c9b41daa
-
SSDEEP
12288:WRQUC5A1a7+aGANskcgiesCvaDK/CuEjKtjkxlg5QXS9MZT40:wQUwYaaauK9vaDKKvjmkxlg5Qi9MZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a66f72240e54890ee22ddc8db89b1d0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
pid Process 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 384 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 3 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 392 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 4 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 432 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 5 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 476 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 6 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 496 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 7 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 504 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 8 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 592 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 9 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 676 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 10 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 744 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 11 PID 2320 wrote to memory of 808 2320 6a66f72240e54890ee22ddc8db89b1d0N.exe 12
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:392
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1496
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1176
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:108
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1004
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1064
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1108
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:856
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:792
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:496
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:504
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\6a66f72240e54890ee22ddc8db89b1d0N.exe"C:\Users\Admin\AppData\Local\Temp\6a66f72240e54890ee22ddc8db89b1d0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320
-