Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe
Resource
win7-20241010-en
General
-
Target
ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe
-
Size
674KB
-
MD5
392537f4a1363d1f235ac4350096ca9e
-
SHA1
d5c285d8b23424170fac67084cfa9d40601b6f95
-
SHA256
ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353
-
SHA512
db9adad912cf892b4768478cf6c48bf9f2097158e99f7d254aa8f7dcc0c0ec6c2db740fa529ade92a7cc21ad02caacdb7185b57058331346814745618753b5d2
-
SSDEEP
12288:P0EbqWjsZ5uEd2iNmG1ZzfRDcq+CgwiqrUCrdSh2v9dK3y8f0N+1dboqwNDlt:8Eb/W5X1dzRAq+Cg6BrE+dKDf0M1db
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2340 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 30 PID 2880 wrote to memory of 2340 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 30 PID 2880 wrote to memory of 2340 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 30 PID 2880 wrote to memory of 2340 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 30 PID 2880 wrote to memory of 1268 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 31 PID 2880 wrote to memory of 1268 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 31 PID 2880 wrote to memory of 1268 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 31 PID 2880 wrote to memory of 1268 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 31 PID 2880 wrote to memory of 2112 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 32 PID 2880 wrote to memory of 2112 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 32 PID 2880 wrote to memory of 2112 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 32 PID 2880 wrote to memory of 2112 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 32 PID 2880 wrote to memory of 1604 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 33 PID 2880 wrote to memory of 1604 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 33 PID 2880 wrote to memory of 1604 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 33 PID 2880 wrote to memory of 1604 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 33 PID 2880 wrote to memory of 2476 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 34 PID 2880 wrote to memory of 2476 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 34 PID 2880 wrote to memory of 2476 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 34 PID 2880 wrote to memory of 2476 2880 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"2⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"2⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"2⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"2⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"2⤵PID:2476
-