Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe
Resource
win10v2004-20241007-en
General
-
Target
61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe
-
Size
4.8MB
-
MD5
7a159a7c30b904223840b44831c0763f
-
SHA1
19ae6820aeccd5254d1a6718f6afb04d3d23c488
-
SHA256
61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89
-
SHA512
f9c38041e075835ceceff8354e1e32f37a3eee244747968102f10336c57e79538ec1dfbdc9e23cb2645fa4031fdb0d961db3ea9098febabe45482e0745c891b1
-
SSDEEP
98304:vgwqt5FqsPmmRRVfzzby+Wm04/Mq7hNgjJF8Ir4IcjPoEEPDN:vgXFqWp/fzz++h04/MuNgVJLh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe 2308 61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe"C:\Users\Admin\AppData\Local\Temp\61439c0a5518c97c0348954b48784be11a61d1ac1468c350809ced3241d42f89.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2308