Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe
Resource
win10v2004-20240802-en
General
-
Target
188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe
-
Size
966KB
-
MD5
9ead88f3256dd9696c2edc3c82eea20a
-
SHA1
15d8a32c29a3e76c5b9dfa028027378635643d53
-
SHA256
188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8
-
SHA512
7592313feeb443521e67bca3a79577c375581029204519bfe00fd12e9ac254d6bdb34095ab8126311a8c163f59b4573e6c478b394d4fb55d1f8da01db256aa1d
-
SSDEEP
12288:RiV++tJhExqlvnKHBG6hZXE7gr0dtJM7zxhlbUqa93XNHhPVxLtwZ6tS1Zby9dt9:Rk++5+MneBnhIgr0GVb0Xb7ZM6tS1Zm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2284 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 30 PID 2748 wrote to memory of 2284 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 30 PID 2748 wrote to memory of 2284 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 30 PID 2748 wrote to memory of 2284 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 30 PID 2748 wrote to memory of 2788 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 31 PID 2748 wrote to memory of 2788 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 31 PID 2748 wrote to memory of 2788 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 31 PID 2748 wrote to memory of 2788 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 31 PID 2748 wrote to memory of 2860 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 32 PID 2748 wrote to memory of 2860 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 32 PID 2748 wrote to memory of 2860 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 32 PID 2748 wrote to memory of 2860 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 32 PID 2748 wrote to memory of 2516 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 33 PID 2748 wrote to memory of 2516 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 33 PID 2748 wrote to memory of 2516 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 33 PID 2748 wrote to memory of 2516 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 33 PID 2748 wrote to memory of 2728 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 34 PID 2748 wrote to memory of 2728 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 34 PID 2748 wrote to memory of 2728 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 34 PID 2748 wrote to memory of 2728 2748 188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"2⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"2⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"2⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"2⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"C:\Users\Admin\AppData\Local\Temp\188deda69d75ea8500a51f43f7fba2c593cbd8bc98ffade3bac7f63b54f967f8.exe"2⤵PID:2728
-