Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-01-2025 02:40
Behavioral task
behavioral1
Sample
Image-Ogpj.scr
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Image-Ogpj.scr
Resource
win11-20241007-en
General
-
Target
Image-Ogpj.scr
-
Size
845KB
-
MD5
29d032668e1114b96303e872f8dc6b93
-
SHA1
2a938bb8d8409b34918e16041363f28f1e5f0aa9
-
SHA256
7a993a0aa7dfb3ef3685d1e8641f6246a07b4e15a8dda55b892c2cfc10bcdf75
-
SHA512
f1c0c23e45a8ce8e1a31c13a4a033d0ace388e17194bdab3daa95843193af9b6690a473a09d718de3776033a91bd39b2b9a0846bf60199304340915b6998d3fd
-
SSDEEP
24576:PsS04YNEMuExDiU6E5R9s8xY/2l/d+1Ibt+rs:PE4auS+UjfU2T+1Ibt+r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2748 AudioDriver.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Image-Ogpj.scr File opened for modification C:\Windows\assembly\Desktop.ini Image-Ogpj.scr -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly Image-Ogpj.scr File created C:\Windows\assembly\Desktop.ini Image-Ogpj.scr File opened for modification C:\Windows\assembly\Desktop.ini Image-Ogpj.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Image-Ogpj.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe 2748 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 924 wrote to memory of 2748 924 Image-Ogpj.scr 77 PID 924 wrote to memory of 2748 924 Image-Ogpj.scr 77 PID 924 wrote to memory of 2748 924 Image-Ogpj.scr 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\Image-Ogpj.scr"C:\Users\Admin\AppData\Local\Temp\Image-Ogpj.scr" /S1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
845KB
MD529d032668e1114b96303e872f8dc6b93
SHA12a938bb8d8409b34918e16041363f28f1e5f0aa9
SHA2567a993a0aa7dfb3ef3685d1e8641f6246a07b4e15a8dda55b892c2cfc10bcdf75
SHA512f1c0c23e45a8ce8e1a31c13a4a033d0ace388e17194bdab3daa95843193af9b6690a473a09d718de3776033a91bd39b2b9a0846bf60199304340915b6998d3fd