Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-09-2024 17:58
Behavioral task
behavioral1
Sample
loader.exe
Resource
win11-20240802-en
8 signatures
150 seconds
General
-
Target
loader.exe
-
Size
202KB
-
MD5
0da267a9dcd9d54b8c7edd04bd4ecdf3
-
SHA1
c4ec11624a9ba832cc62b05734134fd904da5b5d
-
SHA256
32b4b4f6c49a3a6b8cc970adfe3533b09de4674fba47de82808eb46c8b4b5145
-
SHA512
2aa19300bcdfb45aa9917fc5d4c7e269c3ea5f2fa0a3978728e17ce14b7a80094fc5dd4b0e2fe6425335982005c07cb8cd0016ba10fe1c4f9021cda0548ec60f
-
SSDEEP
3072:gzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIIcfO32vT/T6BQ1bxjOhdiinvh:gLV6Bta6dtJmakIM5+fO32vTj19B+H
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WPA Service = "C:\\Program Files (x86)\\WPA Service\\wpasv.exe" loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WPA Service\wpasv.exe loader.exe File opened for modification C:\Program Files (x86)\WPA Service\wpasv.exe loader.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe 3244 loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3244 loader.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3244 loader.exe Token: SeDebugPrivilege 3244 loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2544