Analysis
-
max time kernel
110s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:58
Behavioral task
behavioral1
Sample
61f55122b4f9144f41b274a04d493663ec1e25bc9ee93155f2655ba2aeb65b8eN.exe
Resource
win7-20240704-en
2 signatures
120 seconds
General
-
Target
61f55122b4f9144f41b274a04d493663ec1e25bc9ee93155f2655ba2aeb65b8eN.exe
-
Size
273KB
-
MD5
8d404a68301efbb723fcf5c1f8cc5700
-
SHA1
7a67ad000ba32fd48ec24e8a4ed037c7aff65d10
-
SHA256
61f55122b4f9144f41b274a04d493663ec1e25bc9ee93155f2655ba2aeb65b8e
-
SHA512
c07cbb13ccd033dc741d2c90631de0fc7831045703e424ec6a038c067f42f8b873b6a56fda2e3017d92d47c856b1c4ae472fc7a79c0ee3b3c44dbff0d5a8926a
-
SSDEEP
6144:kwbOwCC7OU6N9jJgnXe+GTwkJsDKhAIAwTsGVd5J8+og:kKOwR7v6N9jSnX9ewkJsCJQGVvJ8Q
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1560-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-1-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-2-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-3-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-4-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-5-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-6-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-7-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-8-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-9-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-10-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-11-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1560-12-0x0000000000400000-0x0000000000473000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61f55122b4f9144f41b274a04d493663ec1e25bc9ee93155f2655ba2aeb65b8eN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4604 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4604 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\61f55122b4f9144f41b274a04d493663ec1e25bc9ee93155f2655ba2aeb65b8eN.exe"C:\Users\Admin\AppData\Local\Temp\61f55122b4f9144f41b274a04d493663ec1e25bc9ee93155f2655ba2aeb65b8eN.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1560
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x4c01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4604