Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe
Resource
win7-20240903-en
General
-
Target
bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe
-
Size
3.7MB
-
MD5
5d350ff6f79df58f29f77fc7b74d892e
-
SHA1
4cdb861ef0884b613071d7351b3564402722811f
-
SHA256
bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c
-
SHA512
758ff980aaf24e66cc45d410c967d3f37aad9a46db9d79b815f222fd8999786637a5df7d7cb74f194b79a0216b35a3a77e8c2c2c8443194b27eef132b07664ff
-
SSDEEP
98304:YfpDVLWR3t89g0luja0VOsfBR42dNVePoEJimT7fci+DMQzlxkPYm:qpDVaRiabbPBJdDePoEQmPfciIMF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2744 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 31 PID 2508 wrote to memory of 2744 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 31 PID 2508 wrote to memory of 2744 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 31 PID 2508 wrote to memory of 2744 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 31 PID 2508 wrote to memory of 2704 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 32 PID 2508 wrote to memory of 2704 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 32 PID 2508 wrote to memory of 2704 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 32 PID 2508 wrote to memory of 2704 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 32 PID 2508 wrote to memory of 2756 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 33 PID 2508 wrote to memory of 2756 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 33 PID 2508 wrote to memory of 2756 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 33 PID 2508 wrote to memory of 2756 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 33 PID 2508 wrote to memory of 2872 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 34 PID 2508 wrote to memory of 2872 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 34 PID 2508 wrote to memory of 2872 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 34 PID 2508 wrote to memory of 2872 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 34 PID 2508 wrote to memory of 2852 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 35 PID 2508 wrote to memory of 2852 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 35 PID 2508 wrote to memory of 2852 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 35 PID 2508 wrote to memory of 2852 2508 bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"2⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"2⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"2⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"2⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"C:\Users\Admin\AppData\Local\Temp\bbea0c056d01b506a9a6d37b6aca9147466e65a962f4b140887334e6f4a23b6c.exe"2⤵PID:2852
-