Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 01:13 UTC
Behavioral task
behavioral1
Sample
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
Resource
win10v2004-20240802-en
General
-
Target
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
-
Size
32KB
-
MD5
6d6cd3ac8ae40d126b8f827cd870ee5c
-
SHA1
63045ebfe0a7eb38105eefbe051e9a85b7e264f7
-
SHA256
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8
-
SHA512
20a77793ee5dcef0a3f6fd15326045cf56bab1bc17ef9422b12b6b1803e8eaad226aa7b2d40c9db8b0d670d55806f0176a8b39feb55328f78dbbced309bd071f
-
SSDEEP
384:e0bUe5XB4e0XGOt8w0Q0mS03AWTxtTUFQqzFaqObbp:PT9BuVH55dNbp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2332 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe"C:\Users\Admin\AppData\Local\Temp\14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2332
Network
-
Remote address:8.8.8.8:53Requestmichael2009nj.duckdns.orgIN AResponsemichael2009nj.duckdns.orgIN A186.169.89.218
-
Remote address:8.8.8.8:53Requestmichael2009nj.duckdns.orgIN AResponsemichael2009nj.duckdns.orgIN A186.169.89.218
-
Remote address:8.8.8.8:53Requestmichael2009nj.duckdns.orgIN AResponsemichael2009nj.duckdns.orgIN A186.169.89.218
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe152 B 3
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe152 B 3
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe152 B 3
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe152 B 3
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe152 B 3
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe152 B 3
-
186.169.89.218:2828michael2009nj.duckdns.org14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe104 B 2
-
8.8.8.8:53michael2009nj.duckdns.orgdns14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe71 B 87 B 1 1
DNS Request
michael2009nj.duckdns.org
DNS Response
186.169.89.218
-
8.8.8.8:53michael2009nj.duckdns.orgdns14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe71 B 87 B 1 1
DNS Request
michael2009nj.duckdns.org
DNS Response
186.169.89.218
-
8.8.8.8:53michael2009nj.duckdns.orgdns14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe71 B 87 B 1 1
DNS Request
michael2009nj.duckdns.org
DNS Response
186.169.89.218