Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 05:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ExecutorApp.exe
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ExecutorApp.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
ExecutorApp.exe
-
Size
14.4MB
-
MD5
ac2af0147ab39be0de0af0be02d15362
-
SHA1
4ccf6e0b7e7e32efe20e5769af93ecba16704496
-
SHA256
1a898c654b4d5ecc752f9f5f6174ab4757b1f95f0860decdb92de386feb38d73
-
SHA512
01827fdca8d8a353acca00e97fcdce354cf5c4489bdc4246c197dfbe7f5d4db11669885ca26db21c2db4d415aea391467f31d1aac77cd3d26b903f76539413ff
-
SSDEEP
98304:iQUflio9cVcN1B7XJlUMmhH4/19/L/S2m3CuLYPr5lyCPGKWvv0eMc8:DIFUu/L/S2m3CuLYPr5lyCPGKE0w8
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExecutorApp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 ExecutorApp.exe