Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe
Resource
win7-20240729-en
General
-
Target
f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe
-
Size
53KB
-
MD5
a61b4683de0819ea1759ab9213ac77d7
-
SHA1
8b96224454aa706139d751816c724a882ac563ed
-
SHA256
f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b
-
SHA512
de600e0d26208ecd66e3bb647e9316e2bba2e7b5282c615c603878034f0a5ea6612ca48a82768181fb3fe611659e9f226ad053b7f8970978a7f302ad2dec7f5b
-
SSDEEP
768:bTA6UyXqdGMaZpbWPU/xHn1ftNSWMyOpcHOl2k5j/FBWKP62r9a8tYcFGVc6K:AvzOLbWmHrlMyEc/WFBXFr9aAGVcl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2544 f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe"C:\Users\Admin\AppData\Local\Temp\f4d5285b5ddf8b93586572c67c90434c952d9ffd868508d4de0be44377b3bd0b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544