Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe
Resource
win7-20240903-en
General
-
Target
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe
-
Size
723KB
-
MD5
f62b09877bf8505631af6328a5ffe43d
-
SHA1
825126634ded449283e102ca030a9bb8da808ebe
-
SHA256
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3
-
SHA512
a3eededf1e61fdbabba706a5e212c7c48c191e45e05f203fa496e5162dc3d6f7636513309f65966729c6df9c54cc9b6c3cfc6809915917152405f40170e97b41
-
SSDEEP
12288:gM3ZJ0BWeQhUDt+t6WhjR1F5RsQTx+AZLRLdcNjtEO:1ZhUDt+jR1F5pcuLdcr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exepid Process 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exedescription pid Process Token: SeDebugPrivilege 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exedescription pid Process procid_target PID 2888 wrote to memory of 2784 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 30 PID 2888 wrote to memory of 2784 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 30 PID 2888 wrote to memory of 2784 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 30 PID 2888 wrote to memory of 2784 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 30 PID 2888 wrote to memory of 2732 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 31 PID 2888 wrote to memory of 2732 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 31 PID 2888 wrote to memory of 2732 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 31 PID 2888 wrote to memory of 2732 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 31 PID 2888 wrote to memory of 2816 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 32 PID 2888 wrote to memory of 2816 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 32 PID 2888 wrote to memory of 2816 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 32 PID 2888 wrote to memory of 2816 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 32 PID 2888 wrote to memory of 2620 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 33 PID 2888 wrote to memory of 2620 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 33 PID 2888 wrote to memory of 2620 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 33 PID 2888 wrote to memory of 2620 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 33 PID 2888 wrote to memory of 2616 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 34 PID 2888 wrote to memory of 2616 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 34 PID 2888 wrote to memory of 2616 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 34 PID 2888 wrote to memory of 2616 2888 67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"2⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"2⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"C:\Users\Admin\AppData\Local\Temp\67605bfe77b822b7256723089082b0f15b23bb69e6de86191750b660c0a438e3.exe"2⤵PID:2616
-