Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 01:14
Behavioral task
behavioral1
Sample
4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe
Resource
win10v2004-20241007-en
General
-
Target
4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe
-
Size
43KB
-
MD5
587b41a4b882a71a5e8e1ed72f9514a1
-
SHA1
274674cac5c4dbb17f84c8b8c26a741e424d89f5
-
SHA256
4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48
-
SHA512
b484eda2e07c878fb85778aabf8c53619a407024d20cc6837994418b0500366e7f8f668a7547f6c944488611d6696eb3a3624cc2a5f74df9827a956c525c42d4
-
SSDEEP
384:TZyGRFAJ2HytDU6jDgwMMzio8qpuu9D9O5UE5QzwBlpJNakkjh/TzF7pWnDmgre/:d32oStgI0Y+zq8vQO+au+L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: 33 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe Token: SeIncBasePriorityPrivilege 464 4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe"C:\Users\Admin\AppData\Local\Temp\4160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:464