Analysis
-
max time kernel
121s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 12:51
Static task
static1
Behavioral task
behavioral1
Sample
8WL@O7~XlRY.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8WL@O7~XlRY.zip
Resource
win10v2004-20241007-en
General
-
Target
8WL@O7~XlRY.zip
-
Size
1.3MB
-
MD5
f2a2deb66220dec15632f27d91bbdb16
-
SHA1
8edd492215d95f2df5088a2626fb87664697790a
-
SHA256
de94a3e312de49229cfd088163fb38610b286c7399eb5dc15410e46a25fafb2e
-
SHA512
ee611e2b151627adb6ce2caa5a29091a0d8e202099de56fa99fdea022a3ca03b26b5da2747a340198f81d12f57a00b58e5c7169d1ee29a38fd84e4a51fc51fd5
-
SSDEEP
24576:mX8eLw0r9awIWR9DkplieZ2NOpo88EyV3zM1mOBACY+W8jBgGGOiFTQobTJq:m9r9FImB9fOpo443zMDBo+9WGziF0obw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4140 Bootstrapper.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4024 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4024 7zFM.exe Token: 35 4024 7zFM.exe Token: SeSecurityPrivilege 4024 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4024 7zFM.exe 4024 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4140 4024 7zFM.exe 102 PID 4024 wrote to memory of 4140 4024 7zFM.exe 102 PID 4024 wrote to memory of 4140 4024 7zFM.exe 102
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\8WL@O7~XlRY.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\7zO8BF19529\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO8BF19529\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD58ad45fd72a78fb731a2ba19df0149cae
SHA1a0614e43edaa61ee50f750c95e5a9361ee76fc3d
SHA2565612aad58f43e1beb974deda0f1f678e1a4b5f74dbb07a94db5b9558f2814426
SHA512f94c257a90526a86fb93f0d2fbae87fa4326a3c35aac62c0cc46ee2b2b5f94faefd8d6535594e2d0e317b4c3e4ee468bf3b2b0876ee59440f7a2270d45adacea