Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 01:17
Static task
static1
Behavioral task
behavioral1
Sample
188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe
Resource
win10v2004-20241007-en
General
-
Target
188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe
-
Size
386KB
-
MD5
6a01559558f60ce650be0d9ac259c5ba
-
SHA1
80b9b13b29a147ad64793de62cd5165ed83523f0
-
SHA256
188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871
-
SHA512
5b1aaccd96c6cabaf8ad7c7ca0eef7178689af6af5c9c775dcfc22826f8bb70230133dae335f49d614b7afadf442516f2ce34108514610dde27919b1b2e0b27a
-
SSDEEP
12288:AxFgQMRLeUfKUa0+AsFkaqLTn3YBy5aeb:IEfK/O9Tnfgeb
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30 PID 2988 wrote to memory of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30 PID 2988 wrote to memory of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30 PID 2988 wrote to memory of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30 PID 2988 wrote to memory of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30 PID 2988 wrote to memory of 2512 2988 188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe"C:\Users\Admin\AppData\Local\Temp\188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exeC:\Users\Admin\AppData\Local\Temp\188278452f81eae9bb68fdceaf6f5b75188bfb8f33792ea2115abfc12fe35871.exe2⤵
- System Location Discovery: System Language Discovery
PID:2512
-