Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 00:49

General

  • Target

    sample.exe

  • Size

    27KB

  • MD5

    665ec018a239fca7d6745c590a5610c2

  • SHA1

    4bb1e8388d2508cc07363be0a26849c50f7685d3

  • SHA256

    dd2b45ae8c212c2870994a9069d600b93e84bba19bb9b4c7d1d3e6ca260b0361

  • SHA512

    a01ad80a17c2d3b09008f0e7ab527153920d57873f711915f0d4962d95d6c248d6414a5e02aef1892b238d468de8f04fb609b34032a9ce2bc133869d99f6c134

  • SSDEEP

    384:hLjkbV23m4AfVBol22CoP6udRNMpAQk93vmhm7UMKmIEecKdbXTzm9bVhca96hrZ:BjeJ7gEpA/vMHTi9bD

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2700-0-0x0000000074E71000-0x0000000074E72000-memory.dmp

    Filesize

    4KB

  • memory/2700-1-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-2-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-5-0x0000000074E70000-0x000000007541B000-memory.dmp

    Filesize

    5.7MB