Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 13:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe
Resource
win7-20240903-en
3 signatures
120 seconds
General
-
Target
45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe
-
Size
7KB
-
MD5
efb300728cc6abad6005e98417031110
-
SHA1
0f7143fdb0ea3d9a52ed2cb738d7abcbf5790f2c
-
SHA256
45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691e
-
SHA512
02f61ac6b5e583993ae239554b5cdecbb6ea2d75abc19f7c8fe13bcb7821113ca72565ed4da4549b6148f7bc4a2493e209c7b318a6a669aa79b21d71cab52dba
-
SSDEEP
96:+t1b9mNmHx9+ia+H7493kOmcG5nOR7nnh2V2pprl0bzNt:+9m+xTvbxOmXO9n8V2ppJ09
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2104 45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe"C:\Users\Admin\AppData\Local\Temp\45d177fa58f5866863009793a9266d1778a99a4162a40dd9f7579af8de2f691eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2104