Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 11:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
nnn.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
nnn.exe
-
Size
1.1MB
-
MD5
d339683a764e49413878a53ecca1115e
-
SHA1
b1cdad94beb95570bf79ce8ddce303a6adc6a645
-
SHA256
6fd73d755b0173df9d053ee54130059e4ffabbd12cf220a4475137943cae7461
-
SHA512
1ad85d4af989bcbae1a9d14fd46adacef7fc060997171d4685bdc64f55fe0dcd3b006764e68ac89c61ccd43a2273a0abdb71b3b3ef29708dbd68c3391bcc9649
-
SSDEEP
24576:/2YKVYezmE95uretDFKzOBEwAftuvmYpMtSHc/JW1:/2YKVPCeeb5YO908/JW
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
nnn.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ByteLength.vbs nnn.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 6184 2940 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
nnn.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnn.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
nnn.exepid Process 2940 nnn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
nnn.exedescription pid Process Token: SeDebugPrivilege 2940 nnn.exe Token: SeDebugPrivilege 2940 nnn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
nnn.exedescription pid Process procid_target PID 2940 wrote to memory of 6184 2940 nnn.exe 30 PID 2940 wrote to memory of 6184 2940 nnn.exe 30 PID 2940 wrote to memory of 6184 2940 nnn.exe 30 PID 2940 wrote to memory of 6184 2940 nnn.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\nnn.exe"C:\Users\Admin\AppData\Local\Temp\nnn.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 6362⤵
- Program crash
PID:6184
-