Overview
overview
7Static
static
5malware.exe
windows7-x64
3malware.exe
windows10-2004-x64
3malware.exe
windows7-x64
5malware.exe
windows10-2004-x64
5malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
7malware.exe
windows7-x64
5malware.exe
windows10-2004-x64
5malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
7malware.exe
windows7-x64
5malware.exe
windows10-2004-x64
5malware.exe
windows7-x64
3malware.exe
windows10-2004-x64
3malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
7malware.exe
windows7-x64
7malware.exe
windows10-2004-x64
5Analysis
-
max time kernel
90s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 08:58
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
malware.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
malware.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
malware.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
malware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
malware.exe
Resource
win7-20240903-en
General
-
Target
malware.exe
-
Size
123KB
-
MD5
84714c100d2dfc88629531f6456b8276
-
SHA1
ecce2684f143b02fc187a4a6af22f1e9ed6c2c6f
-
SHA256
861aa9c5ddcb5284e1ba4e5d7ebacfa297567c353446506ee4b4e39c84454b09
-
SHA512
f5aa29698821747adb66d5c414958c4dfa82346ddb23b3b517eddcd36af90adf346527611c697022bf54f0da4410bc326d67ced3ebe4cca7e5be8f77bdcd9604
-
SSDEEP
1536:k27ySIQJlLCzvOkzFf7y4gp5yWvAasTjny4n9V+i1tM5fZ8an8QpEpq:x1IQlLC7RzllWvAasrXbSj8aEI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malware.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3856 malware.exe 3856 malware.exe 3856 malware.exe 3856 malware.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3856 malware.exe Token: SeDebugPrivilege 3856 malware.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55 PID 3856 wrote to memory of 3388 3856 malware.exe 55
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:764
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:780
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3060
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3780
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3896
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3960
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4048
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2196
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3636
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3164
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:2832
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1196
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3016
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:4944
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1480
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1584
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2612
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1996
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2272
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2672
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2944
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3856
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2176
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:5100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2956