Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 01:26
Static task
static1
Behavioral task
behavioral1
Sample
b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe
Resource
win10v2004-20241007-en
General
-
Target
b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe
-
Size
1.4MB
-
MD5
042d705501648eb5bcdf6376a097496e
-
SHA1
7acade2cf1421b85812fff2ed6809ce0e2a00d71
-
SHA256
b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82
-
SHA512
5f789fb3ef4d28f92480f3edabc26ae15e2732f2417d86a1422a6d40927b57f2cbb10cd4450a5176d0e0c7bc2b6f3ea7a9ca06691fa78f4e04568ec17692e309
-
SSDEEP
24576:fecUd1RfHu9HWnNdTBboQv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:mc8XPu9HWNdTZoMjLoyEkmZ9Y14
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2752 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 30 PID 2868 wrote to memory of 2752 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 30 PID 2868 wrote to memory of 2752 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 30 PID 2868 wrote to memory of 2752 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 30 PID 2868 wrote to memory of 2844 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 31 PID 2868 wrote to memory of 2844 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 31 PID 2868 wrote to memory of 2844 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 31 PID 2868 wrote to memory of 2844 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 31 PID 2868 wrote to memory of 2644 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 32 PID 2868 wrote to memory of 2644 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 32 PID 2868 wrote to memory of 2644 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 32 PID 2868 wrote to memory of 2644 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 32 PID 2868 wrote to memory of 2636 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 33 PID 2868 wrote to memory of 2636 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 33 PID 2868 wrote to memory of 2636 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 33 PID 2868 wrote to memory of 2636 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 33 PID 2868 wrote to memory of 2616 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 34 PID 2868 wrote to memory of 2616 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 34 PID 2868 wrote to memory of 2616 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 34 PID 2868 wrote to memory of 2616 2868 b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"2⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"2⤵PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"2⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"2⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"C:\Users\Admin\AppData\Local\Temp\b00654ec6cc853e29db934f988f05fcb0c1c221d79979d22ff9e56fb9e89cd82.exe"2⤵PID:2616
-