Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 07:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
zjrtdbt3.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
zjrtdbt3.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
17 signatures
150 seconds
General
-
Target
zjrtdbt3.exe
-
Size
806KB
-
MD5
707b311ccf5b3f5d49e422e447c4336b
-
SHA1
157b280bf0e4d55118221da9cbe9d5739204e050
-
SHA256
d2605d6c7df64c9cc45fb58cefeb196489812e8e7e607556d4817aecb61681fd
-
SHA512
c6df8c0a465d9e5fe84b3b2198cfe6a921e0b177902a49aa76e127a56b989f8d35c3adc6733973cbfe13ac10bba9bf3eac0cb182ec28be797c0d48af94c74376
-
SSDEEP
24576:Y2Q9NXw2/wPOjdGxY7kqjVnlqud+/2P+Aey:YTq24GjdGS7kqXfd+/9Aey
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjrtdbt3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 zjrtdbt3.exe