Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
-lightroom 5 עkeygen/keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
-lightroom 5 עkeygen/keygen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
-lightroom 5 עkeygen/120-.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
-lightroom 5 עkeygen/120-.url
Resource
win10v2004-20240802-en
General
-
Target
-lightroom 5 עkeygen/keygen.exe
-
Size
121KB
-
MD5
67766ceb8f827dd4e99af10d416ff893
-
SHA1
982ed4893d3e6d2dab652fac8a0dc0f4d52a06b7
-
SHA256
c666b29230f5c2c29a79830177e0dda67c13cd8cbea227d3c4beeb800a98fea5
-
SHA512
be5086467098605d008784b79e7937d622532be558d03cd744755137b223fa72aeeefc84612568ad4da4188c749584cee26bc6cb35eb9cf995133735af4235f1
-
SSDEEP
3072:A3p+0+TBU5RtJ4jhvawCf5h9zYRGDZ11wBnrlnhUmP:A3SmbtJevawCxh9zYUN11srZia
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts keygen.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4452 keygen.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3532 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3532 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\-lightroom 5 עkeygen\keygen.exe"C:\Users\Admin\AppData\Local\Temp\-lightroom 5 עkeygen\keygen.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4452
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d8 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD563ac5683c8f3b3e56d745fc5703447d2
SHA19f820feefe58177bfaea0721b10b44b9622473f7
SHA2562b1e1f839137a4410387102d923d953f85a9edf9efd3cfa1b7989b4f4fdc2a6d
SHA512633f48541e8d25a29ec70f192d145af0e067a5fc6db47aa00194861cdd923074b76d299a18e73cadc1ee5987a2f5bc2e147f181408c398bcf2e5f460a29b5b2a