Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 17:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
random.exe
-
Size
1.2MB
-
MD5
a50e232d3a5a725cf8324977ce2cc2ec
-
SHA1
6f663cc2a2df04cab4e84048674d118742bf9b55
-
SHA256
30fee1328110552c83645241f3ebbfb3e743182c9c08d5259cec20941c5c0f4a
-
SHA512
60b4f15cfeaaa1dd3ffbbb7efc5750272c26d658767ca4d4e493d8c437a222502ec6f017b96155a80d6e9f7f54835880ff7018169ee24856b9c64befca7f06ef
-
SSDEEP
24576:1dMkfr422JUVryvPAD37f3rZzKbCHS6F+dbAdpBzahM:zfrJWEyvPAnf3rZWmyIy
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winhubt.vbs random.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 868 2196 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2196 random.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2196 random.exe Token: SeDebugPrivilege 2196 random.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 868 2196 random.exe 31 PID 2196 wrote to memory of 868 2196 random.exe 31 PID 2196 wrote to memory of 868 2196 random.exe 31 PID 2196 wrote to memory of 868 2196 random.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 6322⤵
- Program crash
PID:868
-