Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
1C40D9E61FBBD5D9054638B98B10E1CF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1C40D9E61FBBD5D9054638B98B10E1CF.exe
Resource
win10v2004-20241007-en
General
-
Target
1C40D9E61FBBD5D9054638B98B10E1CF.exe
-
Size
1.1MB
-
MD5
1c40d9e61fbbd5d9054638b98b10e1cf
-
SHA1
145119e649cabc6c60200643b3cc347fc4b164cc
-
SHA256
854b586f8d0cad52a042ccee32691dc9c30e6a32bd3805024934f43e169325af
-
SHA512
970eade0dce9dfaf5acdaf88721e55071fc48c4570c9a9b78c875d81fba54b047aed93412e331466a461662e065020f189b1dc1ec324b9394dd531ab2e3b3cf1
-
SSDEEP
24576:TE9h8YY4mB7WnMSTdTvX+5pdKj30HZQHEGP:TeGYDmBcBpvEpdKj3W/i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1C40D9E61FBBD5D9054638B98B10E1CF.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C40D9E61FBBD5D9054638B98B10E1CF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1C40D9E61FBBD5D9054638B98B10E1CF.exedescription pid Process Token: SeDebugPrivilege 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
1C40D9E61FBBD5D9054638B98B10E1CF.exedescription pid Process procid_target PID 1996 wrote to memory of 2996 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 31 PID 1996 wrote to memory of 2996 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 31 PID 1996 wrote to memory of 2996 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 31 PID 1996 wrote to memory of 2996 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 31 PID 1996 wrote to memory of 2292 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 32 PID 1996 wrote to memory of 2292 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 32 PID 1996 wrote to memory of 2292 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 32 PID 1996 wrote to memory of 2292 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 32 PID 1996 wrote to memory of 2520 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 33 PID 1996 wrote to memory of 2520 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 33 PID 1996 wrote to memory of 2520 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 33 PID 1996 wrote to memory of 2520 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 33 PID 1996 wrote to memory of 2532 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 34 PID 1996 wrote to memory of 2532 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 34 PID 1996 wrote to memory of 2532 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 34 PID 1996 wrote to memory of 2532 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 34 PID 1996 wrote to memory of 2500 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 35 PID 1996 wrote to memory of 2500 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 35 PID 1996 wrote to memory of 2500 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 35 PID 1996 wrote to memory of 2500 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 35 PID 1996 wrote to memory of 2496 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 36 PID 1996 wrote to memory of 2496 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 36 PID 1996 wrote to memory of 2496 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 36 PID 1996 wrote to memory of 2496 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 36 PID 1996 wrote to memory of 2516 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 37 PID 1996 wrote to memory of 2516 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 37 PID 1996 wrote to memory of 2516 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 37 PID 1996 wrote to memory of 2516 1996 1C40D9E61FBBD5D9054638B98B10E1CF.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"C:\Users\Admin\AppData\Local\Temp\1C40D9E61FBBD5D9054638B98B10E1CF.exe"2⤵PID:2516
-