Analysis
-
max time kernel
100s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 16:35
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
sample.exe
-
Size
10KB
-
MD5
f9f442a4b86baebfcf39a24eeb39d48b
-
SHA1
b316ea6e8de46a530b09e295c7b3e44ae4fbd60f
-
SHA256
e05450882b77b27ffde9c694a43568391419da965f68bd8f9dcecad9df83c8ec
-
SHA512
db72706a96bd17da0e474c86aaf3b1f902846e222870c75d9e4659fda3a17be6d7025ef2f68ac7233812e54d40602cb0f7af7f0fe79d1a3fc0a38d4494dd2e69
-
SSDEEP
192:F8fzqMmTL+f6eeAY82mNZRZ1eLP/x1fkNvFCDko:F8GMmv+f6eX22RZ0LXTsN0ko
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\sample.exe'\"" sample.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe