Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 06:53
Behavioral task
behavioral1
Sample
0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
-
Size
55KB
-
MD5
563cfd7cc9c80650d3fc036b40cd5020
-
SHA1
ad902fe07dd8e65b55b3dd99376fff44fe2d7faa
-
SHA256
0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7b
-
SHA512
6d4a3d8d31fc199f76615a066a715dbbab5b185611c1a46843245a2ac069cfa35aed9aa7d41c46271f45a8b6febff2a8d8635ba24ef9cbea10aecc4f18d45496
-
SSDEEP
1536:jGCoDns0NiiSx1YDtwsNMDsXExI3pmem:joDnwXTYDtwsNMDsXExI3pm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: 33 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe Token: SeIncBasePriorityPrivilege 3016 0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe"C:\Users\Admin\AppData\Local\Temp\0da0698beb4c1f1ca6a24dcb2776e8ad47399ffb1faeaa3b6f207838ff564e7bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3016