Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 03:02
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240910-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
sample.exe
-
Size
32KB
-
MD5
6d6cd3ac8ae40d126b8f827cd870ee5c
-
SHA1
63045ebfe0a7eb38105eefbe051e9a85b7e264f7
-
SHA256
14100f8848c185ca08a4024c6da12a490a4034989d7f05814b65bc60b95bb5d8
-
SHA512
20a77793ee5dcef0a3f6fd15326045cf56bab1bc17ef9422b12b6b1803e8eaad226aa7b2d40c9db8b0d670d55806f0176a8b39feb55328f78dbbced309bd071f
-
SSDEEP
384:e0bUe5XB4e0XGOt8w0Q0mS03AWTxtTUFQqzFaqObbp:PT9BuVH55dNbp
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2536 sample.exe Token: 33 2536 sample.exe Token: SeIncBasePriorityPrivilege 2536 sample.exe Token: 33 2536 sample.exe Token: SeIncBasePriorityPrivilege 2536 sample.exe Token: 33 2536 sample.exe Token: SeIncBasePriorityPrivilege 2536 sample.exe Token: 33 2536 sample.exe Token: SeIncBasePriorityPrivilege 2536 sample.exe