Analysis

  • max time kernel
    1799s
  • max time network
    1800s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-10-2024 12:05

General

  • Target

    client nj.exe

  • Size

    61KB

  • MD5

    058a8b71d991427fa70d6b7d92841f64

  • SHA1

    7843d0567d64f151431e777e8ce684a0c234796c

  • SHA256

    c205d2e4eb3f6e767e7c866a444aa6ac35157ed479f9dda2eaef131939e600e2

  • SHA512

    4ffdf2e8f6629e585abd2044778413f64c546a9a4d44359b1847be544bb905db5cb3ca28d763e662ca4a5567b887a677b30891e9cfca37db47e7487d3a51d072

  • SSDEEP

    1536:t0zI/rO0+twuCiVTlTOvwo0ia9P3AwmF9bc:tYI6POiVAIHn9PFmF9b

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\client nj.exe
    "C:\Users\Admin\AppData\Local\Temp\client nj.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4580-0-0x0000000074A91000-0x0000000074A92000-memory.dmp

    Filesize

    4KB

  • memory/4580-1-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/4580-2-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/4580-3-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB

  • memory/4580-4-0x0000000074A90000-0x0000000075041000-memory.dmp

    Filesize

    5.7MB