Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe
Resource
win10v2004-20241007-en
General
-
Target
d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe
-
Size
1.8MB
-
MD5
507c2728ba08f885fc759122bec3976f
-
SHA1
8bb0dafbc7d605672c13b72c8df4996e80457f5b
-
SHA256
d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610
-
SHA512
20a23708820c677a5d43f25fab9de40f2b501404a05254b51990869d39cf338c82fc7e717a423cdb800b83615b1300c5b6e1471dac376c493e80ccf50e60139d
-
SSDEEP
49152:2pkodX1G3mDdfGLZy/M/UKzgXadbUfudZYs+r:2pkots3Idf3hXady
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe"C:\Users\Admin\AppData\Local\Temp\d69f744fe8d9884ab8b3e3b345f230480e35dce2e96ceab91b5f13192f045610.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2388