Analysis
-
max time kernel
117s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 03:49
Behavioral task
behavioral1
Sample
84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe
-
Size
55KB
-
MD5
be8cd1da6a1058ae99f0719d05812090
-
SHA1
e87922d7417e674c8bfbf67e8773586614e4855d
-
SHA256
84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69
-
SHA512
f233f34daf1df3d5b634f717f1d03fdbb2ce67db6aec51cd8bbd48758db686b9f62ca486d2f1b3323d398ea280f932ea39122c2977a62399071323b90d9f2899
-
SSDEEP
768:rlCPl+t1Man0KI2NO5SioJ3Q8kSN2mwFvfu0YMDHPs2/L7XJSxI3pmDm:rl2sDnXNO5SiKlD7wsNMDfXExI3pmDm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: 33 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe Token: SeIncBasePriorityPrivilege 2516 84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe"C:\Users\Admin\AppData\Local\Temp\84baa90a226d364d74123b8024bacf0f4a830dc84818037b4e8375384fff3f69N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2516