Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-12-2024 23:55
Behavioral task
behavioral1
Sample
pest.exe
Resource
win7-20241023-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
pest.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
9 signatures
150 seconds
Behavioral task
behavioral3
Sample
pest.exe
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
9 signatures
150 seconds
General
-
Target
pest.exe
-
Size
202KB
-
MD5
3a25b8b57fee2dbe05b915a4ba5a5f23
-
SHA1
d563fc3b01275e873b938a5f08e15809a8ea44b7
-
SHA256
586ed5d88e9c4b4c7d64fdc87c134f464cee29a2c75cd7021195e057dbcfaf1c
-
SHA512
1c7549ae11347dfe60a5db10a169cb5990ba3f1a34a8cdaadd52525bba1c0fad2a932f02f1962289cf02d087d7bcdea9a2d5ac23cc69172dff4a782c82c553a6
-
SSDEEP
6144:QLV6Bta6dtJmakIM5JzxAnuBlMvBZORkl:QLV6BtpmkMxAIFkl
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DSL Service = "C:\\Program Files (x86)\\DSL Service\\dslsv.exe" pest.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pest.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DSL Service\dslsv.exe pest.exe File opened for modification C:\Program Files (x86)\DSL Service\dslsv.exe pest.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pest.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe 4668 pest.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4668 pest.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4668 pest.exe Token: SeDebugPrivilege 4668 pest.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pest.exe"C:\Users\Admin\AppData\Local\Temp\pest.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4668