Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 06:21
Behavioral task
behavioral1
Sample
Fast Download.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Fast Download.exe
Resource
win10v2004-20241007-en
General
-
Target
Fast Download.exe
-
Size
27KB
-
MD5
97d80681daef809909ac1b1e3b9898ba
-
SHA1
f0ecc4ef701ea6ff61290f6fd4407049cd904e60
-
SHA256
345d5d2759abd08a84c4c2e2a337a1babd02b5eda3921db1b83eb5d5f5ccc011
-
SHA512
f90bb8868612f5bc52c07cf90c4e62daf47ba3a3418fae3a82030bff449d62cd83ce185b22fdae632abdb661c8e3a725cc5fa5c44e47ca34f9ccbda6fafd21da
-
SSDEEP
384:YL1q6J1G4APO7l0j8YCYPPdR9MZAQk93vmhm7UMKmIEecKdbXTzm9bVhcaW6mr6s:mccEY6AZA/vMHTi9bD
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Fast Download.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fast Download.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe Token: 33 1432 Fast Download.exe Token: SeIncBasePriorityPrivilege 1432 Fast Download.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1432 wrote to memory of 5012 1432 Fast Download.exe 86 PID 1432 wrote to memory of 5012 1432 Fast Download.exe 86 PID 1432 wrote to memory of 5012 1432 Fast Download.exe 86 PID 1432 wrote to memory of 5024 1432 Fast Download.exe 87 PID 1432 wrote to memory of 5024 1432 Fast Download.exe 87 PID 1432 wrote to memory of 5024 1432 Fast Download.exe 87 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5012 attrib.exe 5024 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fast Download.exe"C:\Users\Admin\AppData\Local\Temp\Fast Download.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5012
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5024
-