Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 06:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2e72d847aa6ea6680c769628c4ea4938.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
2e72d847aa6ea6680c769628c4ea4938.exe
-
Size
3.6MB
-
MD5
2e72d847aa6ea6680c769628c4ea4938
-
SHA1
5f4a1cacb1c414787a51444a06c1081a2e6eb469
-
SHA256
a1ba76a8c187d43080d95acfb939a54d1b1c83546bbb4547990bbfcafd88c307
-
SHA512
6c9797f4c4fdf0e36cc4efbb564f46617b5e83fc0ea44c4e1932e870183a577fedfd07f0376531841084892e1499cc870524c3f0aa707a61f187a779330629c1
-
SSDEEP
98304:Kh6wZR7VXWhBwoGQ/9KHjlWsO9ndIdYYWGyF:26iOwfS9KpWNa4
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e72d847aa6ea6680c769628c4ea4938.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe 2968 2e72d847aa6ea6680c769628c4ea4938.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2968 2e72d847aa6ea6680c769628c4ea4938.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2856 2968 2e72d847aa6ea6680c769628c4ea4938.exe 30 PID 2968 wrote to memory of 2856 2968 2e72d847aa6ea6680c769628c4ea4938.exe 30 PID 2968 wrote to memory of 2856 2968 2e72d847aa6ea6680c769628c4ea4938.exe 30 PID 2968 wrote to memory of 2856 2968 2e72d847aa6ea6680c769628c4ea4938.exe 30 PID 2968 wrote to memory of 2604 2968 2e72d847aa6ea6680c769628c4ea4938.exe 31 PID 2968 wrote to memory of 2604 2968 2e72d847aa6ea6680c769628c4ea4938.exe 31 PID 2968 wrote to memory of 2604 2968 2e72d847aa6ea6680c769628c4ea4938.exe 31 PID 2968 wrote to memory of 2604 2968 2e72d847aa6ea6680c769628c4ea4938.exe 31 PID 2968 wrote to memory of 2752 2968 2e72d847aa6ea6680c769628c4ea4938.exe 32 PID 2968 wrote to memory of 2752 2968 2e72d847aa6ea6680c769628c4ea4938.exe 32 PID 2968 wrote to memory of 2752 2968 2e72d847aa6ea6680c769628c4ea4938.exe 32 PID 2968 wrote to memory of 2752 2968 2e72d847aa6ea6680c769628c4ea4938.exe 32 PID 2968 wrote to memory of 2948 2968 2e72d847aa6ea6680c769628c4ea4938.exe 33 PID 2968 wrote to memory of 2948 2968 2e72d847aa6ea6680c769628c4ea4938.exe 33 PID 2968 wrote to memory of 2948 2968 2e72d847aa6ea6680c769628c4ea4938.exe 33 PID 2968 wrote to memory of 2948 2968 2e72d847aa6ea6680c769628c4ea4938.exe 33 PID 2968 wrote to memory of 2932 2968 2e72d847aa6ea6680c769628c4ea4938.exe 34 PID 2968 wrote to memory of 2932 2968 2e72d847aa6ea6680c769628c4ea4938.exe 34 PID 2968 wrote to memory of 2932 2968 2e72d847aa6ea6680c769628c4ea4938.exe 34 PID 2968 wrote to memory of 2932 2968 2e72d847aa6ea6680c769628c4ea4938.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"2⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"2⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"2⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"2⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"C:\Users\Admin\AppData\Local\Temp\2e72d847aa6ea6680c769628c4ea4938.exe"2⤵PID:2932
-