Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-12-2024 04:48
Behavioral task
behavioral1
Sample
New Client.exe
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
3 signatures
150 seconds
General
-
Target
New Client.exe
-
Size
164KB
-
MD5
c0176890b7a76bc4b4361994288794ec
-
SHA1
fad41ab4f12c10d01609f3d9c821baeab407304f
-
SHA256
62cdff077aa0bd67d1b52e1d5e5b5aa34ec9e74dd2d2440f6b02d2f73a249b6e
-
SHA512
82509544d7637b7d87ca04e3335bd36816683e17f34787523556b2c35816770f36f5166fa022565f37b1b0c1898031266bf618f0fdec92fabbe5efa240e919e3
-
SSDEEP
3072:j6GN/4ZmTcci+ui9vhggOYyKqvO5ctEs+SNwCUbEM09a8U:j6f+ui9vq4qvAsNNObTO
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 21 6.tcp.eu.ngrok.io -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Client.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe Token: 33 4308 New Client.exe Token: SeIncBasePriorityPrivilege 4308 New Client.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Client.exe"C:\Users\Admin\AppData\Local\Temp\New Client.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5784,i,690293423614796501,17475910179943560176,262144 --variations-seed-version --mojo-platform-channel-handle=3848 /prefetch:81⤵PID:1412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5132,i,690293423614796501,17475910179943560176,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:81⤵PID:3328