Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2024, 13:47 UTC

General

  • Target

    Bawless Cracked@Neural_Programmers/Bawless.exe

  • Size

    14.7MB

  • MD5

    2fd36877f3c0f74cb98fdd041c06c5e2

  • SHA1

    ae23f650cc5cdf50676a4e5f0f44fcd2acf769ae

  • SHA256

    c39c732accfafc55f30d9e6cd8352731d66752886c054d75811b1581739b22cd

  • SHA512

    b7389c539e9f360abab37dd62a2a6b019f19d8fc12cde9263e29b2f8143d59d9860e7a93a743d209e544a9535b901a54aa8720eb63324b33b729ec857973a5c7

  • SSDEEP

    393216:72l9Yl7Elel7ElAlQleTl/l/l/l/l/lzlml/lqlZlHl/l/l/l/l/l/lIlAl+lUlF:oT6T

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bawless Cracked@Neural_Programmers\Bawless.exe
    "C:\Users\Admin\AppData\Local\Temp\Bawless Cracked@Neural_Programmers\Bawless.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2772
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2948

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2772-0-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

      Filesize

      4KB

    • memory/2772-1-0x0000000000B80000-0x0000000001A30000-memory.dmp

      Filesize

      14.7MB

    • memory/2772-2-0x0000000007600000-0x0000000007852000-memory.dmp

      Filesize

      2.3MB

    • memory/2772-3-0x0000000074AC0000-0x00000000751AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2772-4-0x0000000074AC0000-0x00000000751AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2772-5-0x00000000084B0000-0x00000000086A6000-memory.dmp

      Filesize

      2.0MB

    • memory/2772-6-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

      Filesize

      4KB

    • memory/2772-7-0x0000000074AC0000-0x00000000751AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2772-10-0x0000000074AC0000-0x00000000751AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2772-11-0x0000000074AC0000-0x00000000751AE000-memory.dmp

      Filesize

      6.9MB

    • memory/2772-12-0x0000000074AC0000-0x00000000751AE000-memory.dmp

      Filesize

      6.9MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.