Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 14:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
KRcLFIz5PCQunB7.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
KRcLFIz5PCQunB7.exe
-
Size
3.5MB
-
MD5
a08b35662044abf9528c24c3f663eaed
-
SHA1
aee7831f263e6b83198a790d8a8948a841a600e2
-
SHA256
3f233256d32f8c33884510be0e50b614a35642f6ed7cb76b1f480373b548b295
-
SHA512
0866868cbf52999b233546348cde08c3cfcf2deef86830a319d8430e6d815a02b8438f46c944fbd9f2010d7e9fcb6f4f77db490280894b899de0afc71278b5dd
-
SSDEEP
49152:Uf+eHq329+bhPCNJZxh2H4s0E04nfxhFZ9kIODfdWutT825SkDh83TQ237w4fGi:U+MrJZqYsTfnFZ9ktfgtSSTQ23s4p
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
KRcLFIz5PCQunB7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KRcLFIz5PCQunB7.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
KRcLFIz5PCQunB7.exepid process 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe 540 KRcLFIz5PCQunB7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
KRcLFIz5PCQunB7.exedescription pid process Token: SeDebugPrivilege 540 KRcLFIz5PCQunB7.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
KRcLFIz5PCQunB7.exedescription pid process target process PID 540 wrote to memory of 1668 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1668 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1668 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1668 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1944 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1944 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1944 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 1944 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 3052 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 3052 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 3052 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 3052 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2620 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2620 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2620 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2620 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2652 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2652 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2652 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe PID 540 wrote to memory of 2652 540 KRcLFIz5PCQunB7.exe KRcLFIz5PCQunB7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"2⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"2⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"2⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"C:\Users\Admin\AppData\Local\Temp\KRcLFIz5PCQunB7.exe"2⤵PID:2652
-