Analysis
-
max time kernel
109s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe
Resource
win10v2004-20240802-en
General
-
Target
e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe
-
Size
231KB
-
MD5
d5f41af05103f42d357cc7908f9d0836
-
SHA1
e7d3a78dfa0db696bd5b44862570fa0bb42ce842
-
SHA256
e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090
-
SHA512
13431d883aad3668d9b117b928d4b05ad19e0b248b7ee9b521c3cdeff0f88c0d0e9d5fdb8a10b3991ca68a577f58e6050cf20450c0f7ab1cf6a98a5ed64be6a4
-
SSDEEP
6144:lr4DeFpRHL+5LNOT5x5sFGVyci7Ej3ZiECwC+zlg:lr4DwpRrKO1YYVhiiSwHO
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3108 1140 audiohd.exe 85 -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 119.28.48.232 Destination IP 180.163.8.114 Destination IP 59.36.120.151 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiohd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3952 e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3952 e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe"C:\Users\Admin\AppData\Local\Temp\e858608dab4d72142f8895b0bdb426c30bce24b0b5f725c355b91cf036100090.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
C:\Users\Admin\AppData\Local\Microsoft\audiohd.exeC:\Users\Admin\AppData\Local\Microsoft\audiohd.exe1⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:3108