Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe
Resource
win10v2004-20241007-en
General
-
Target
488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe
-
Size
5.6MB
-
MD5
b15300a93e7cc445b6c774c50fa1e898
-
SHA1
5017ad0a73b0a511163e75157ed4e5bf581d8965
-
SHA256
488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7
-
SHA512
2460cc00db5c0de2f1af118c41698efff5fdbc403008641e652470bb9304ab9ef2db9fde36a1203cc861f8b09aba897b71f8a0ff4a7d978b903cffcfbdf6cd24
-
SSDEEP
98304:kgwqt5FqsP1+Wm04/Mq7kzzbmmRRV9NgjJF8IrGIRhdwsHETCCZ:kgXFqW1+h04/MpzzF/9NgVnxwY0Ce
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe 4744 488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe"C:\Users\Admin\AppData\Local\Temp\488af9d2cabb4da76fdc6f34a4d6a91941f7f0566cc608e6b6d5b8a7fa38c2c7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4744