Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe
Resource
win10v2004-20241007-en
General
-
Target
a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe
-
Size
1.1MB
-
MD5
aa3e783898f8ba7a42cb05a0b8ee7dcc
-
SHA1
f5faf6af37ef433182fae2f1fb16b930068552a7
-
SHA256
a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068
-
SHA512
a6ce50ebc8dbf2dbfbb75eb907983d760e9cd513fc023aaccc96833ae3baf19ef5d452006ffc94fc8569112b7975312ddf4b16b5771a1acb23103f28ae19ecc8
-
SSDEEP
24576:MVJrJ3YpLtsXGx9Q8zQ/+kCsg+T3yKqTbG39zy:MJoUXGx9i/w0jyd+y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2960 a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe 2960 a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2960 a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2960 a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2960 a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe 2960 a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe"C:\Users\Admin\AppData\Local\Temp\a792b676c5c8338be41b2d54a02b31cc2c8ddbba6fdd12b5f9bd7d67fee37068.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c9b1c07b9f3232fb450d10a8d01228bf
SHA1be53dcf2c22edf8f7f171e9ca07781590aa9f041
SHA25650821afaa0fa400cb7adf6d6dd84ec430045706490f87c35f631b880dcb8f948
SHA5124fade5d89c8c24ef32cc4e2cce8feffe6701eff00cc9662b33d32823f94b0a6cf7171654f6e5abfd59ee6c07b88e035569b945d4107a67e121d9bc0b08486234