Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 01:13
Behavioral task
behavioral1
Sample
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
Resource
win10v2004-20240802-en
General
-
Target
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
-
Size
32KB
-
MD5
6d6cd3ac8ae40d126b8f827cd870ee5c
-
SHA1
63045ebfe0a7eb38105eefbe051e9a85b7e264f7
-
SHA256
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8
-
SHA512
20a77793ee5dcef0a3f6fd15326045cf56bab1bc17ef9422b12b6b1803e8eaad226aa7b2d40c9db8b0d670d55806f0176a8b39feb55328f78dbbced309bd071f
-
SSDEEP
384:e0bUe5XB4e0XGOt8w0Q0mS03AWTxtTUFQqzFaqObbp:PT9BuVH55dNbp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: 33 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe Token: SeIncBasePriorityPrivilege 2848 14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe"C:\Users\Admin\AppData\Local\Temp\14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2848