Analysis

  • max time kernel
    294s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:14

General

  • Target

    119.unp.exe

  • Size

    68KB

  • MD5

    1d79ad8323f4c0d42a5886be05a9c635

  • SHA1

    ce40f723074765819876b2ae579d5b1ad78558b6

  • SHA256

    fbaa0b9fe6f035b1c466a75f768c6c86da669af72b363de043b4e5339bbbc4de

  • SHA512

    77704129642a75c6bba54ad2c174ddf131190e1ed327d9ac57300cb10777f7498712edd66c66be485004717c4bd278d865855072bfed28ca76cd715ebff460b3

  • SSDEEP

    768:yRl1JQ56c46jVT+XtVkWVGcPYSh4IwyyFN/yFHiWv6cF/hlL3Yw+oEy4AhmarTr8:2LA6YTzSqrzsFCe/h53Yk4Ak4RBU

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\119.unp.exe
    "C:\Users\Admin\AppData\Local\Temp\119.unp.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads